Red Hat CERTIFICATE SYSTEM 7.1 - ADMINISTRATOR Administrator's Manual page 225

Hide thumbs Also See for CERTIFICATE SYSTEM 7.1 - ADMINISTRATOR:
Table of Contents

Advertisement

Step B. Facilitate the Key Recovery Agents to Change the Passwords
During the installation of Data Recovery Manager, after you specified the m of n scheme,
you were also prompted to provide unique passwords for each recovery agent. It is quite
likely that you specified these passwords yourself instead of it being done by those
individuals who have been designated with the key recovery agents' role in your
organization. Therefore, you must get the designated recovery agents to change the
passwords entered during installation.
To understand the significance of key recovery agents' passwords, see "Key Recovery
Agents and Their Passwords" on page 193.
To get the recovery agents to change the passwords, follow the instructions in
"Changing Key Recovery Agents' Passwords" on page 201.
Step C. Determine the Authorization Mode for Key Recovery
The Data Recovery Manager allows key recovery agents to authorize recovery of an
end-entity's encryption private key locally or remotely. The default configuration is local
authorization. It is important that you evaluate both the authorization modes, and choose the
one that is appropriate for your organization. For more information about this, see "Local
Versus Remote Key Recovery Authorization" on page 194.
If want the key recovery agents to authorize key recovery remotely, be sure to set them up
as Data Recovery Manager agents following the instructions in "Setting up Administrators,
Agents, and Auditors" on page 318.
Step D. Customize the Key Recovery Form
Key recovery agents need an appropriate interface to initiate the key recovery process. By
default, the Data Recovery Manager's Agent Services interface includes an HTML form
(
) that allows key recovery agents to initiate the key recovery process
recoverKey.html
and retrieve end-entity's encryption keys. For details about this form, check CS
Customization Guide.
If you want to customize this form to suit your organization, be careful not to delete any of
the information that is vital to the functioning of the form; it is recommended that you
restrict your changes to the content presented in the form.
Step E. Configure Key Recovery Policies
This step is optional.
Configuring Key Archival and Recovery Process
Chapter 6
Data Recovery Manager
225

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CERTIFICATE SYSTEM 7.1 - ADMINISTRATOR and is the answer not in the manual?

This manual is also suitable for:

Certificate system 7.1 - adminsistrator

Table of Contents