3 performing configuration and operation tasks – HP Secure Key Manager User Manual

Page 4

Advertising
background image

Creating and installing the SKM Server Certificate .................................................................. 47

Propagating third-party certificates .............................................................................................. 48

Copying the certificates ....................................................................................................... 48
Installing the certificates ...................................................................................................... 49

Enrolling client devices with the SKM ........................................................................................... 49
Verifying that installation and initial configuration is successful
........................................................ 49

3 Performing configuration and operation tasks ....................................... 51

Key and policy procedures ......................................................................................................... 51

Creating a key ................................................................................................................... 51
Importing a key
.................................................................................................................. 51
Setting group permissions for a key ...................................................................................... 52
Downloading an RSA key
.................................................................................................... 52
Deleting a key ................................................................................................................... 53

Authorization policy procedures .................................................................................................. 53

Creating an authorization policy .......................................................................................... 53
Deleting an authorization policy
........................................................................................... 53

User and group procedures ........................................................................................................ 54

Creating a user .................................................................................................................. 54
Creating a group
............................................................................................................... 54
Adding a user to a group
.................................................................................................... 54
Removing a user from a group ............................................................................................. 55
Deleting a user
.................................................................................................................. 55
Deleting a group
................................................................................................................ 55

LDAP server procedures ............................................................................................................. 56

Setting up the LDAP user directory ........................................................................................ 56
Testing the LDAP user directory connection
............................................................................. 56
Setting up the LDAP schema
................................................................................................ 56
Setting up an LDAP failover server
........................................................................................ 56
Testing the LDAP failover server connection ............................................................................ 57

Certificate procedures ............................................................................................................... 57

Creating a certificate request ............................................................................................... 57
Creating a server certificate for the SKM
............................................................................... 57
Creating a client certificate .................................................................................................. 59
Creating a self-signed certificate .......................................................................................... 60
Installing a certificate .......................................................................................................... 61
Installing a certificate chain ................................................................................................. 62
Downloading a certificate
................................................................................................... 62

Certificate Authority (CA) procedures .......................................................................................... 63

Adding a CA certificate to the trusted CA list ......................................................................... 63
Removing a CA certificate from the trusted CA list
.................................................................. 63
Creating a new trusted CA list profile
.................................................................................... 63
Deleting a trusted CA list profile ........................................................................................... 64
Signing certificate requests with a local CA
........................................................................... 64
Viewing the certificates signed by a local CA
........................................................................ 64
Downloading a local CA
.................................................................................................... 64
Deleting a local CA ............................................................................................................ 65
Creating a local CA
........................................................................................................... 65
Creating a self-signed root CA
............................................................................................. 65
Creating an intermediate CA request
.................................................................................... 65
Installing a CA certificate .................................................................................................... 66
Removing a CA certificate ................................................................................................... 67

FIPS status server procedures ...................................................................................................... 67

Enabling the FIPS status server ............................................................................................. 67

4

Advertising