Red Hat CERTIFICATE SYSTEM 7.1 - ADMINISTRATOR Administrator's Manual page 229

Hide thumbs Also See for CERTIFICATE SYSTEM 7.1 - ADMINISTRATOR:
Table of Contents

Advertisement

Click Show Key.
4.
If the key has been archived successfully, you should see the information pertaining to
that key.
Click Recover.
5.
In the form that appears, enter the following information:
6.
The PKCS #12 password; the Data Recovery Manager uses this password to
encrypt the PKCS #12 package (see "How Agent-Initiated Key Recovery Works"
on page 195).
The base-64 encoded certificate that corresponds to the private key you want to
recover; use the enrollment authority's end-entity or agent interface to get this
information. If you searched for the archived key by providing the base-64
encoded certificate in (step 4), then you don't have to provide this information.
The key recovery agents' passwords.
Click Recover.
7.
If you entered the correct information, the Data Recovery Manager returns the private
key packaged as a PKCS #12 blob (it contains the recovered key pair and the
corresponding certificate) and prompts you to save it. Specify the path and filename for
saving the encrypted file. Be sure not to change the default file extension (
Step E. Restore the Key in the Browser's Database
To do this:
Go to the security information window of your browser.
1.
Import the
2.
*.p12
Open the test email that you couldn't verify after deleting the certificate from the
3.
browser's certificate database; you should be able to verify it again.
file (that you saved in the previous step) back into the browser.
Configuring Key Archival and Recovery Process
.p12
Chapter 6
Data Recovery Manager
).
229

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CERTIFICATE SYSTEM 7.1 - ADMINISTRATOR and is the answer not in the manual?

This manual is also suitable for:

Certificate system 7.1 - adminsistrator

Table of Contents