Figure 6-2
The agent-initiated key recovery process
These are the steps shown in Figure 6-2:
The Data Recovery Manager agent accesses the Key Recovery form using the
1.
appropriate client certificate, types the identification information pertaining to
the person whose encryption private key needs to be recovered, and submits
the request.
The request is submitted to the Data Recovery Manager over HTTPS.
The Data Recovery Manager subjects the key recovery request to its policy
2.
checks.
Key Recovery Process
Chapter 6
Data Recovery Manager
209
Need help?
Do you have a question about the NETSCAPE MANAGEMENT SYSTEM 6.1 - ADMINISTRATOR and is the answer not in the manual?
Questions and answers