Hp Secure Key Manager Manuale Utente Pagina 168

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
Vedere la pagina 167
Conguring the K
MS Server
The HP StorageW
orks Secure Key Manager allows you to off-load cryptographic operations from
application servers and other back-end devices to the SKM. Clients, such as application servers and
databases, make requests to the KMS Server to perform cryptographic operations. The KMS Server is
capable of performing such cryptographic operations as asymmetric and symmetric encryption and
decryption, MACs and MAC veries, keyed hashes, digital signatures and verications, RNG, and
combinations of these operations. This chapter contains the following topics:
•Authenticat
ion Overview
Key Management Services Conguration Sections
KMS Server Procedures
•HealthChec
kOverview
Health Check Sections
Authentication overview
The communication between the KMS client and the server varies slightly, depending on whether your
KMS conguration requires users to authenticate. If you decide not to authenticate, then users have access
only to global keys. Global keys are keys that are available to everyone, with no authentication required.
If you want to require authentication, then you must create keys for each user or group of users. An
authenticated user has access to all global keys, all the keys owned by the user, and all keys accessible
to groups to which that user belongs. In addition, a group of users can have an authorization policy
assigned to it, which restricts the use of the keys accessible by that group to certain time periods or
certain operations per hour.
The KMS Server can dene a local users and groups list or you can use an LDAP server to centrally
manage your users and groups.
Authentication Options
The KMS S
erver provides many options with respect to security and authentication. You can:
mandate SSL – You can choose between SSL connections and standard TCP connections; SSL
connections are more secure since all data exchanged between client and server is encrypted.
allow g
lobal sessions – You can allow clients to access and create global keys without providing
avalid
username and password to the KMS Server; this obviously does not offer a high level
of sec
urity.
disable global sessions – You can disable global sessions altogether, which requires all users
to provide either a valid username and password combination, or a client certicate signed
by a CA trusted by the KMS Server.
requ
ire client certicates You can require that clients present a client certicate in order to
establish SSL connections. This client certicate can be the sole means of authenticating to the
KMS Server, or it can be used in tandem with a username and password combination.
enfo
rce strong, two-factor authentication – You can take the require client certicates option one
ste
p further by having the KMS Server derive the username from the certicate; that username is
the
n compared against the username provided in the authentication request. If the usernames
match up and the password provided is correct, then the user is authenticated.
We recommend that you enforce the most stringent security policy supported by the KMS Server.
Such a security policy would mandate SSL, disallow global sessions, and enforce strong, two-factor
au
thentication.
Key Access and Ownership
Keys can be created as global or owned by a particular user (keys are not owned by administrators).
When you give group access permission for a key, all the users in that group can use that particular
key (after authenticating to the server).
168
Using the Management Console
Vedere la pagina 167
1 2 ... 163 164 165 166 167 168 169 170 171 172 173 ... 326 327

Commenti su questo manuale

Nessun commento