HP Secure Key Manager User Manual
Page 5
Viewing the FIPS status report .............................................................................................. 67
KMS server procedures .............................................................................................................. 68
Enabling SSL ..................................................................................................................... 68
Enabling key and policy configuration by client applications .................................................... 68
Enabling the LDAP server .................................................................................................... 68
Enabling password authentication ........................................................................................ 69
Enabling client certificate authentication ................................................................................ 69
Configuring the user account lockout settings ......................................................................... 69
Clustering procedures ................................................................................................................ 70
Creating a cluster ............................................................................................................... 70
Joining a cluster ................................................................................................................. 70
Synchronizing with a cluster member .................................................................................... 70
Setting up SSL in a cluster .................................................................................................... 71
Removing a device from a cluster ......................................................................................... 71
Upgrading a cluster ............................................................................................................ 72
Deleting a cluster ............................................................................................................... 72
Date and time procedures .......................................................................................................... 72
Setting the date and time on the SKM ................................................................................... 72
Configuring an NTP server connection .................................................................................. 72
Manually synchronizing with an NTP server ........................................................................... 73
IP authorization procedures ........................................................................................................ 73
Specifying which clients can connect to the SKM .................................................................... 73
SNMP procedures .................................................................................................................... 74
Configuring SNMPv1/v2 on the SKM ................................................................................... 74
Configuring SNMPv3 on the SKM ........................................................................................ 74
Administrator procedures ........................................................................................................... 75
Creating an administrator ................................................................................................... 75
Deleting an administrator .................................................................................................... 75
LDAP Administrator server procedures ......................................................................................... 75
Setting up the LDAP administrator server ................................................................................ 75
Testing the LDAP administrator server connection .................................................................... 76
Setting up the LDAP schema ................................................................................................ 76
Setting up the LDAP failover server ........................................................................................ 76
Testing the LDAP failover server connection ............................................................................ 76
Password management procedures .............................................................................................. 77
Changing your password .................................................................................................... 77
Configuring password settings for local administrators ............................................................. 77
Changing passwords when a security officer leaves ................................................................ 77
Multiple credentials procedures .................................................................................................. 78
Configuring the multiple credentials feature ............................................................................ 78
Granting credentials ........................................................................................................... 78
Revoking a credential grant ................................................................................................. 79
Remote administration procedures ............................................................................................... 79
Enabling the Web Admin User Authentication feature ............................................................. 79
Signing a certificate request and downloading the certificate ............................................ 79
Converting a certificate from PEM to PKCS12 format ........................................................ 80
Importing a certificate to a web browser ......................................................................... 80
Enabling Web Admin User Authentication on the SKM ..................................................... 80
Backup procedures for keys, configurations, and certificates ........................................................... 81
Importing and exporting keys between clusters ....................................................................... 81
Backing up configurations and certificates to external server, then to CD ................................... 87
Backing up keys to external server, then to DVD ..................................................................... 88
Log configuration procedures ..................................................................................................... 89
Configuring log rotation ...................................................................................................... 89
Enabling syslog .................................................................................................................. 90
Secure Key Manager
5