Viewing the create key section, Create key section components – HP Secure Key Manager User Manual

Page 131

Advertising
background image

Figure 56 Viewing the Create Key section

The following table describes the components of the Create Key section.

Table 37 Create Key section components

Description

Component

This is the name that the server uses to refer to the key. The key name must begin with
a letter, must be between 1 and 64 characters (inclusive), and can consist of only letters,
numbers, underscores (_), periods (.), and hyphens (-).

Key Name

You do not have to specify an owner for the key; if you leave that field blank, the im-
ported key is a global key and therefore accessible to all users. If you want to assign
an owner for the key, you can specify any valid user in the Owner Username field. If
you assign an owner, then that user is the only user who can access the key (unless
the key is given additional group permissions later).

Owner Username

The algorithm might be any one of the following:

AES-256

AES-192

AES-128

DES-EDE-168 (three key triple DES)

DES-EDE-112 (two key triple DES)

DES

RC4-128

RC4-40

HmacSHA1

RSA-2048

RSA-1024

RSA-512

NOTE:

Some of the algorithms listed above will not be available on FIPS-compliant
devices.

Algorithm

A check mark in the box indicates that the key is deletable via an XML request by the
key owner (or any user for global keys). After a key is created, this value may be
changed.

Deletable

A check mark in the box indicates that the key is exportable via an XML request. An
exportable key can be exported by its owner and by members of a group with “Export”
permission for the key. (A global key marked exportable can be exported by any user.)
After a key is created, this value may be changed.

Exportable

Secure Key Manager

131

Advertising