beautypg.com

Glossary – HP Secure Key Manager User Manual

Page 321

background image

Glossary

Active Device

In the VRRP group, this is the device that is receiving all network traffic. This

is typically the primary device; however, in case of failure on the primary, the

secondary device becomes the active device.

Authorization

policy

The criteria for granting or denying access to a network resource, based on the

user’s identity. This usually follows authentication.

Certificate

Authority

a trusted third-party organization or company that issues digital certificates used

to create digital signatures and public-private key pairs. The role of the CA in

this process is to guarantee that the individual granted the unique certificate is,

in fact, who he or she claims to be.

Extended

Tape Library

Architecture

This type of architecture enables HP Enterprise Libraries to be compatible with

the SKM system.

Failback

The process by which control of network traffic shifts back from the slave to

the master.

Failover

The process by which control of network traffic shifts from the master device

to the slave.

Federal

Information

Processing

Standard

Publication

A Standard for Security Categorization of Federal Information and Information

Systems

Key Management

System (KMS)

Server

The KMS server is the firmware component of the SKM server that manages

communications between the SKM and the clients.

Lightweight

Directory Access

Protocol

LDAP is an Internet standard for storing, retrieving, and managing directory

data. LDAP provides the mechanism for search capabilities and authentication.

Master

See Primary device

Monitor IP

IP address that is used as a source address to establish a monitored connection

to the other devices in the virtual group.

Network Time

Protocol

an Internet standard protocol that synchronizes clock times in a network of

computers. NTP synchronizes client workstation clocks to the U.S. Naval

Observatory Master Clocks in Washington, DC and Colorado Springs, CO.

Running as a continuous background client program on a computer, NTP sends

periodic time requests to servers, obtaining server time stamps, and using them

to adjust the client’s clock.

Passive device

In the VRRP group, the secondary device starts out as the passive device. As the

passive device, the role of the secondary device is to listen for VRRP messages

from the primary device. In the event that the primary device is unable to

send out those VRRP messages, the secondary device takes over as the active

device, receiving all network traffic. As soon as the primary device is able to

Secure Key Manager

321