Versioned keys, Group permissions, 48 viewing the key properties section – HP Secure Key Manager User Manual

Page 112: 28 key properties section components

Advertising
background image

key. Instead it gives a new name to the existing metadata and key bytes. To create a copy of an existing

key, use the Clone Key section.

Figure 48 Viewing the Key Properties section

The following table describes the components of the Key Properties section.

Table 28 Key Properties section components

Component

Description

Key Name

Name of key described in the current row.

Owner Username

Name of the user that owns the key. If blank, the key is a global key and therefore

accessible to all users.

NOTE:

Once a key has an owner it is no longer a global key. You cannot change

it into a global key by removing the owner. This is true even if the key was

originally created as a global key.

Algorithm

The algorithm this key uses.

Creation Date

Display the timestamp made at the time of the key’s creation.

Versioned Key Bytes

Indicates if this is a versioned key.

Deletable

If selected, this key is deletable via an XML request by the key owner. This value

may be changed.

Exportable

If selected, this key is exportable via an XML request. An exportable key can be

exported by its owner and by members of a group with “Export” permission for the

key. A global key marked exportable can be exported by any user. This value

may be changed.

Edit

Click Edit to edit the Key Name, Owner Username, exportable, and deletable

settings.

Back

Click Back to return to the Key and Policy Configuration page.

Versioned keys

A versioned key maintains the same key metadata, but has a unique set of bytes for each version.

Thus, each version is different enough for encryption purposes, but similar enough to allow for easy

management. Each key version has its own key bytes, default IV, state, and creation date. The state

determines which key operations are available for a key version. Possible states are: active, restricted,

and retired.

Active: encryption and decryption and all key management options are allowed.

Restricted: only key information operations are allowed.

Retired: no operations or access to key management is allowed.

The state, combined with the key type and group permissions determine how the key version can be used.

Ultimately, a key version can only be used when: the key’s group permissions permit the operation, the

112

Using the Management Console

Advertising