HP Secure Key Manager User Manual

Page 5

Advertising
background image

Viewing the FIPS status report .............................................................................................. 67

KMS server procedures .............................................................................................................. 68

Enabling SSL ..................................................................................................................... 68
Enabling key and policy configuration by client applications
.................................................... 68
Enabling the LDAP server
.................................................................................................... 68
Enabling password authentication ........................................................................................ 69
Enabling client certificate authentication
................................................................................ 69
Configuring the user account lockout settings
......................................................................... 69

Clustering procedures ................................................................................................................ 70

Creating a cluster ............................................................................................................... 70
Joining a cluster
................................................................................................................. 70
Synchronizing with a cluster member
.................................................................................... 70
Setting up SSL in a cluster .................................................................................................... 71
Removing a device from a cluster
......................................................................................... 71
Upgrading a cluster ............................................................................................................ 72
Deleting a cluster
............................................................................................................... 72

Date and time procedures .......................................................................................................... 72

Setting the date and time on the SKM ................................................................................... 72
Configuring an NTP server connection
.................................................................................. 72
Manually synchronizing with an NTP server ........................................................................... 73

IP authorization procedures ........................................................................................................ 73

Specifying which clients can connect to the SKM .................................................................... 73

SNMP procedures .................................................................................................................... 74

Configuring SNMPv1/v2 on the SKM ................................................................................... 74
Configuring SNMPv3 on the SKM
........................................................................................ 74

Administrator procedures ........................................................................................................... 75

Creating an administrator ................................................................................................... 75
Deleting an administrator
.................................................................................................... 75

LDAP Administrator server procedures ......................................................................................... 75

Setting up the LDAP administrator server ................................................................................ 75
Testing the LDAP administrator server connection .................................................................... 76
Setting up the LDAP schema
................................................................................................ 76
Setting up the LDAP failover server
........................................................................................ 76
Testing the LDAP failover server connection
............................................................................ 76

Password management procedures .............................................................................................. 77

Changing your password .................................................................................................... 77
Configuring password settings for local administrators
............................................................. 77
Changing passwords when a security officer leaves
................................................................ 77

Multiple credentials procedures .................................................................................................. 78

Configuring the multiple credentials feature ............................................................................ 78
Granting credentials
........................................................................................................... 78
Revoking a credential grant ................................................................................................. 79

Remote administration procedures ............................................................................................... 79

Enabling the Web Admin User Authentication feature ............................................................. 79

Signing a certificate request and downloading the certificate ............................................ 79
Converting a certificate from PEM to PKCS12 format ........................................................ 80
Importing a certificate to a web browser
......................................................................... 80
Enabling Web Admin User Authentication on the SKM
..................................................... 80

Backup procedures for keys, configurations, and certificates ........................................................... 81

Importing and exporting keys between clusters ....................................................................... 81
Backing up configurations and certificates to external server, then to CD ................................... 87
Backing up keys to external server, then to DVD ..................................................................... 88

Log configuration procedures ..................................................................................................... 89

Configuring log rotation ...................................................................................................... 89
Enabling syslog .................................................................................................................. 90

Secure Key Manager

5

Advertising