Click Show Key.
4.
If the key has been archived successfully, you should see the information pertaining to
that key.
Click Recover.
5.
In the form that appears, enter the following information:
6.
The PKCS #12 password; the Data Recovery Manager uses this password to
❍
encrypt the PKCS #12 package (see "How Agent-Initiated Key Recovery Works"
on page 195).
The base-64 encoded certificate that corresponds to the private key you want to
❍
recover; use the enrollment authority's end-entity or agent interface to get this
information. If you searched for the archived key by providing the base-64
encoded certificate in (step 4), then you don't have to provide this information.
The key recovery agents' passwords.
❍
Click Recover.
7.
If you entered the correct information, the Data Recovery Manager returns the private
key packaged as a PKCS #12 blob (it contains the recovered key pair and the
corresponding certificate) and prompts you to save it. Specify the path and filename for
saving the encrypted file. Be sure not to change the default file extension (
Step E. Restore the Key in the Browser's Database
To do this:
Go to the security information window of your browser.
1.
Import the
2.
*.p12
Open the test email that you couldn't verify after deleting the certificate from the
3.
browser's certificate database; you should be able to verify it again.
file (that you saved in the previous step) back into the browser.
Configuring Key Archival and Recovery Process
.p12
Chapter 6
Data Recovery Manager
).
229
Need help?
Do you have a question about the CERTIFICATE SYSTEM 7.1 - ADMINISTRATOR and is the answer not in the manual?