Netscape MANAGEMENT SYSTEM 6.1 - AGENT GUIDE Manual page 75

Table of Contents

Advertisement

Key identifiers. Use this section to find an archived key with a specific key
identifier or to list all keys within a range of key identifiers.
To find a key with a specific key identifier, enter the key identifier in both
the upper limit and lower limit fields. Use decimal or hexadecimal form.
Use
to indicate the beginning of a hexadecimal number; for example,
0x
. (Key identifiers are displayed in hexadecimal form in the Search
0x2A
Results and Details pages.)
To find all keys within a range of key identifiers, enter the upper and lower
limits of the key identifier range (in decimal or hexadecimal form).
If you leave either the lower limit or upper limit field blank, all keys before
or after the one you specify are displayed.
Certificate. Use this section to find the archived key that corresponds to a
specific public key. Select the check box and paste the certificate containing the
corresponding public key (in base-64 encoded form) into the text area. (You
must first find and copy the encoded form of the encryption certificate
associated with the key pair. Use the Certificate Manager or Registration
Manager Agent Services pages to find the certificate; for instructions, see
"Examining Certificates" on page 60.)
Archiver. Use this section to find keys that were archived by a specific server.
Select the check box and enter the user ID of the Certificate Manager or
Registration Manager that submitted the key archival request. Note that this
information is available only for archival requests from servers that are remote
from the Data Recovery Manager (that is, not installed in the same server root
directory). To put a limit on the number of results returned, fill in a value for
Maximum Results. To limit the time allowed for the search, enter a value for
Time limit in seconds.
After entering your search criteria, click Show Key.
4.
The Data Recovery Manager displays a list of the keys that match your search
criteria. You can select a key in the list and examine it in more detail (described
in "Selecting a Key" on page 76). If you initiated the search with the Recover
Keys button, you have the option of recovering any key returned by the search
(described in "Recovering Keys" on page 77).
Finding and Recovering Keys
Chapter 6
Recovering Encrypted Data
75

Advertisement

Table of Contents
loading

This manual is also suitable for:

Certificate management system 6.1

Table of Contents