beautypg.com

Enabling the ldap server, Enabling password authentication, Enabling client certificate authentication – HP Secure Key Manager User Manual

Page 58: Configuring the user account lockout settings, Clustering procedures, Creating a cluster, Joining a cluster

background image

Enabling key and policy configuration by client applications

Enabling key and policy configuration by client applications permits the following actions:

create and delete key.

export and import key.

create, delete and modify operations of users and groups.

To enable key and policy configuration by client applications:

1.

Log in to the Management Console as an administrator with KMS Server access control.

2.

Navigate to the KMS Server Settings section of the Key Management Services Configuration page

(Device > KMS Server > KMS Server).

3.

Click Edit.

4.

Select Allow Key and Policy Configuration Operations.

5.

Click Save.

Enabling the LDAP server

To enable the LDAP server:

1.

Log in to the Management Console as an administrator with KMS Server access control.

2.

Navigate to the KMS Server Authentication Settings section of the KMS Server Configuration page

(Device > KMS Server > KMS Server).

3.

Click Edit.

4.

Select LDAP in the User Directory field.

5.

Click Save.

Enabling password authentication

To enable password authentication:

1.

Log in to the Management Console as an administrator with KMS Server access control.

2.

Navigate to the KMS Server Authentication Settings section of the KMS Server Configuration page

(Device > KMS Server > KMS Server).

3.

Click Edit.

4.

Select Required in the Password Authentication field.

5.

Click Save.

Enabling client certificate authentication

To enable client certificate authentication:

1.

Log in to the Management Console as an administrator with KMS Server access control.

2.

Navigate to the KMS Server Authentication Settings section of the KMS Server Configuration page

(Device > KMS Server > KMS Server).

3.

Click Edit.

4.

Select either Used for SSL Session only or Used for SSL session and username in the Client Certificate

Authentication field.

5.

Select a profile list in the Trusted CA List Profile field. The server will use this profile when verifying

that the client certificate is signed by a CA trusted by the SKM.

58

Performing configuration and operation tasks