Glossary – HP Secure Key Manager User Manual
Page 321
Glossary
Active Device
In the VRRP group, this is the device that is receiving all network traffic. This
is typically the primary device; however, in case of failure on the primary, the
secondary device becomes the active device.
Authorization
policy
The criteria for granting or denying access to a network resource, based on the
user’s identity. This usually follows authentication.
Certificate
Authority
a trusted third-party organization or company that issues digital certificates used
to create digital signatures and public-private key pairs. The role of the CA in
this process is to guarantee that the individual granted the unique certificate is,
in fact, who he or she claims to be.
Extended
Tape Library
Architecture
This type of architecture enables HP Enterprise Libraries to be compatible with
the SKM system.
Failback
The process by which control of network traffic shifts back from the slave to
the master.
Failover
The process by which control of network traffic shifts from the master device
to the slave.
Federal
Information
Processing
Standard
Publication
A Standard for Security Categorization of Federal Information and Information
Systems
Key Management
System (KMS)
Server
The KMS server is the firmware component of the SKM server that manages
communications between the SKM and the clients.
Lightweight
Directory Access
Protocol
LDAP is an Internet standard for storing, retrieving, and managing directory
data. LDAP provides the mechanism for search capabilities and authentication.
Master
See Primary device
Monitor IP
IP address that is used as a source address to establish a monitored connection
to the other devices in the virtual group.
Network Time
Protocol
an Internet standard protocol that synchronizes clock times in a network of
computers. NTP synchronizes client workstation clocks to the U.S. Naval
Observatory Master Clocks in Washington, DC and Colorado Springs, CO.
Running as a continuous background client program on a computer, NTP sends
periodic time requests to servers, obtaining server time stamps, and using them
to adjust the client’s clock.
Passive device
In the VRRP group, the secondary device starts out as the passive device. As the
passive device, the role of the secondary device is to listen for VRRP messages
from the primary device. In the event that the primary device is unable to
send out those VRRP messages, the secondary device takes over as the active
device, receiving all network traffic. As soon as the primary device is able to
Secure Key Manager
321