
Table 27 Keys section components
Component Description
Query
Select the quer
y to apply to the page
Run Query
Select this button to run a query. This Management Console displays a subset of the
available keys and their corresponding columns.
Key Name
This is the name that the server uses to refer to the key.
Owner
The owner is typ
ically the user who created the key. If an owner is listed for the
key, then that
user is the only user who can access the key (unless additional
group permiss
ions have been granted for the key). If the key was created in an
unauthenticated XML session, or if no owner was specified when the key was created
on the Management Console, then the key is global, in which case the Owner
Username would be [None]. Global keys can be accessed by all users.
Algorithm
The algorithm might be any of the following:
• AES-256
• AES-192
• AES-128
• DES-EDE-168 (three key triple DES)
• DES-EDE-112 (two key triple DES)
• DES
• RC4-128
• RC4-40
• HmacSHA1
• RSA-2048
• RSA-1024
• RSA-512
NOTE:
Some of the algorithms listed above will not be available on FIPS-compliant
devices.
Deleta
ble
Acheck
mark in the box indicates that the key is deletable via an XML request.
If a key
is marked deletable, only the owner can delete it. Global keys marked
delet
able can be deleted by any user.
Versioned Key
Indicatesifthisisaversionedkey.
Creation Date
Displays a timestamp.
Exportable
An exportable key can be exported by its owner and by members of a group with
“Expo
rt” permission for the key. Global keys marked exportable can be exported
by an
yuser.
Dele
te
Click Delete to delete a key.
CAUTION:
Exercise extreme caution when deleting keys. If you erroneously delete a key,
you cannot recreate that key. Asaresult,unlessyouhaveabackupofthat
key, you will not be able to decrypt any ciphertext created by that key.
Properties
Click Properties to view the properties of a key.
Key Properties
The Key Properties section allows you to view the properties and group permissions of a key. You can
only edit the following fields in this section: Key Name, Owner Username, Deletable, and Exportable.
The Audit Log will capture any changes to these fields. If you change the Key Name or Owner, you will
have to update your applications accordingly. Changing the Key Name does not create an additional
Secure Key Manager
111
Comentarios a estos manuales