Finding And Recovering Keys - Red Hat CERTIFICATE SYSTEM 8 - AGENTS GUIDE Agents Manual

Using web-based agent services
Table of Contents

Advertisement

Chapter 7. DRM: Recovering Encrypted Data
NOTE
If the system changes the state of the displayed request, using the browser's Back or
Forward buttons or the history to navigate through the pages can cause the data shown
to become out of date. To refresh the data, click the highlighted key identifier at the top of
the page.

7.2. Finding and Recovering Keys

If an end user loses a private encryption key or if a key's owner is unavailable, data encrypted with
that key cannot be read unless a copy of the private key was archived when the key was created. The
archived key can then be recovered and used to read the data.
A DRM agent manages key recovery through the DRM agent services page. Archived keys can be
searched to view the details or to initiate a key recovery. Once a key recovery is initiated, a minimum
number of designated DRM agents are required to authorize the recovery.
Certificate System 8.0 uses an m-of-n ACL-based recovery scheme rather than an older secret-
splitting-based recovery scheme.
84

Advertisement

Table of Contents
loading

This manual is also suitable for:

Certificate system 8.0 - administration

Table of Contents