Enabling the ldap server, Enabling password authentication, Enabling client certificate authentication – HP Secure Key Manager User Manual
Page 58: Configuring the user account lockout settings, Clustering procedures, Creating a cluster, Joining a cluster
Enabling key and policy configuration by client applications
Enabling key and policy configuration by client applications permits the following actions:
•
create and delete key.
•
export and import key.
•
create, delete and modify operations of users and groups.
To enable key and policy configuration by client applications:
1.
Log in to the Management Console as an administrator with KMS Server access control.
2.
Navigate to the KMS Server Settings section of the Key Management Services Configuration page
(Device > KMS Server > KMS Server).
3.
Click Edit.
4.
Select Allow Key and Policy Configuration Operations.
5.
Click Save.
Enabling the LDAP server
To enable the LDAP server:
1.
Log in to the Management Console as an administrator with KMS Server access control.
2.
Navigate to the KMS Server Authentication Settings section of the KMS Server Configuration page
(Device > KMS Server > KMS Server).
3.
Click Edit.
4.
Select LDAP in the User Directory field.
5.
Click Save.
Enabling password authentication
To enable password authentication:
1.
Log in to the Management Console as an administrator with KMS Server access control.
2.
Navigate to the KMS Server Authentication Settings section of the KMS Server Configuration page
(Device > KMS Server > KMS Server).
3.
Click Edit.
4.
Select Required in the Password Authentication field.
5.
Click Save.
Enabling client certificate authentication
To enable client certificate authentication:
1.
Log in to the Management Console as an administrator with KMS Server access control.
2.
Navigate to the KMS Server Authentication Settings section of the KMS Server Configuration page
(Device > KMS Server > KMS Server).
3.
Click Edit.
4.
Select either Used for SSL Session only or Used for SSL session and username in the Client Certificate
Authentication field.
5.
Select a profile list in the Trusted CA List Profile field. The server will use this profile when verifying
that the client certificate is signed by a CA trusted by the SKM.
58
Performing configuration and operation tasks