Viewing the create key section, Create key section components – HP Secure Key Manager User Manual
Page 131
Figure 56 Viewing the Create Key section
The following table describes the components of the Create Key section.
Table 37 Create Key section components
Description
Component
This is the name that the server uses to refer to the key. The key name must begin with
a letter, must be between 1 and 64 characters (inclusive), and can consist of only letters,
numbers, underscores (_), periods (.), and hyphens (-).
Key Name
You do not have to specify an owner for the key; if you leave that field blank, the im-
ported key is a global key and therefore accessible to all users. If you want to assign
an owner for the key, you can specify any valid user in the Owner Username field. If
you assign an owner, then that user is the only user who can access the key (unless
the key is given additional group permissions later).
Owner Username
The algorithm might be any one of the following:
•
AES-256
•
AES-192
•
AES-128
•
DES-EDE-168 (three key triple DES)
•
DES-EDE-112 (two key triple DES)
•
DES
•
RC4-128
•
RC4-40
•
HmacSHA1
•
RSA-2048
•
RSA-1024
•
RSA-512
NOTE:
Some of the algorithms listed above will not be available on FIPS-compliant
devices.
Algorithm
A check mark in the box indicates that the key is deletable via an XML request by the
key owner (or any user for global keys). After a key is created, this value may be
changed.
Deletable
A check mark in the box indicates that the key is exportable via an XML request. An
exportable key can be exported by its owner and by members of a group with “Export”
permission for the key. (A global key marked exportable can be exported by any user.)
After a key is created, this value may be changed.
Exportable
Secure Key Manager
131