Red Hat CERTIFICATE SYSTEM 8 Install Manual page 63

Hide thumbs Also See for CERTIFICATE SYSTEM 8:
Table of Contents

Advertisement

7. There is an option for server-side key generation for tokens enrolled through the TPS. If server-
side key generation is selected, supply information about the DRM which will generate keys and
archive encryption keys. Key and certificate recovery is initiated automatically through the TPS,
which is a DRM agent. Select the DRM from the drop-down menu of DRM subsystems within the
security domain.
The hostname for the DRM can be the fully-qualified domain name or an IPv4 or IPv6 address.
8. Fill in the Directory Server authentication directory. This directory is used by the TPS to
authenticate users which access the Enterprise Security Client and as an additional database for
certificates and keys.
This Directory Server instance is not the same Directory Server instance used as the TPS's
internal database. This is a general user directory, which may be accessed by other applications
or users. The TPS's internal database is used exclusively by the TPS and is created on the fly as
the TPS is configured.
Configuring a TPS
53

Advertisement

Table of Contents
loading

This manual is also suitable for:

System 8 - install guide 25-03-2010

Table of Contents