The agent-initiated key recovery process
Figure 22-2
These are the steps shown in Figure 22-2:
The Data Recovery Manager agent accesses the Key Recovery form using the
1.
appropriate client certificate, types the identification information pertaining to
the person whose encryption private key needs to be recovered, and submits
the request.
The request is submitted to the Data Recovery Manager over HTTPS.
The Data Recovery Manager subjects the key recovery request to its policy
2.
checks.
Chapter 22
Setting Up Key Archival and Recovery
Key Recovery Process
725