beautypg.com

Ssl cipher order, 98 viewing the ssl options section, 78 ssl options section components – HP Secure Key Manager User Manual

Page 166

background image

Figure 98 Viewing the SSL Options section

NOTE:

Changes to the SSL Options cause the KMS Server to restart, which takes the KMS offline for a few

seconds.

The following table describes the components of the SSL Options section.

Table 78 SSL Options section components

Component

Description

Allowed Protocols

The Allowed Protocols field allows you to specify which versions of SSL and TLS are

enabled on the SKM. The supported protocols are:

SSL 2.0 (Secure Sockets Layer version 2.0): This protocol is disabled by default

because it has many known security vulnerabilities. We strongly recommend that

you not enable this protocol.

SSL 3.0 (Secure Sockets Layer version 3.0).

TLS 1.0 (Transport Layer Security version 1.0).

NOTE:

If your internet browser is not configured to use the protocol selected here you

will be denied access to the Management Console. Consult and alter your

browser settings before changing these values.

NOTE:

Enabling SSL 2.0 or 3.0 on a FIPS-compliant device will take the device out

of FIPS compliance - possibly in a manner that does not comply with FIPS

standards. For information on disabling FIPS compliance, see

FIPS Compliance

.

Session Key Timeout

(sec)

The Session Key Timeout option specifies the number of seconds that a previously

negotiated session key is reused for incoming SSL client connections to the SKM.

This option determines how frequently key renegotiation takes place on the client

application. The default value is 7200 seconds (2 hours). Setting this value to

0 disables the time-out.

Edit

Click Edit to modify the SSL options.

SSL Cipher Order

Use this section to enable, disable, and order the priority of SSL ciphers.
Different applications and databases support different encryption algorithms for securing SSL sessions. The

SKM supports many SSL ciphers and consequently can communicate securely using all common ciphers.
Please note that the SSL Cipher Order pertains to the communication channel between the client

(application, database, etc.) and the SKM. It does not affect the keys that might be used to encrypt data

by the KMS Server. When an application or database presents the SKM with a list of supported ciphers,

the SKM chooses the supported cipher that is highest on its priority list.

166

Using the Management Console