McAfee MEJCAE-AM-DA Product Guide - Page 147

The Files tab, E-Business Server data

Page 147 highlights

Using the E-Business Server Administration Utility Getting Started with the E-Business Server Administration Utility console 145 Field Encrypt to self Command-line equivalent ebs --encrypt --encrypt-toself Default hash algorithm - Pass through non E-Business Server data while decrypting PGP-MIME compatibility --pass-through - Try to parse MIME body - parts Preserve original filename when decrypting Only decrypt files signed by this key ebs --decrypt --preservename --signed-by Wipe temporary plaintext files after encryption Number of wipe passes ebs --encrypt --wipe ebs --wipe --wipe-passes ebs --encrypt --wipe --wipe-passes See Use to • ENCRYPT-TO-SELF on page 94 • encrypt on page 116 • HASH on page 98 • PASS-THROUGH on page 101 • PGP-MIME on page 101 • PGP-MIMEPARSE on page 102 • PRESERVE-NAME on page 102 • decrypt on page 113 • SIGNEDBY on page 104 • decrypt on page 113 • WIPE on page 110 • encrypt on page 116 • WIPE-PASSES on page 110 • encrypt on page 116 Add the recipient specified in the configuration parameter DEFAULT-KEY to a list of recipients for an encrypted file. This generally ensures that you have the ability to decrypt anything that you encrypt for others, since the DEFAULT-KEY value is usually your own. Define the default hash algorithm for signing and encrypt-and-sign operations using an RSA Legacy key. Tell E-Business Server not to generate errors if it encounters non-E-Business Server data when decrypting. Specify compatibility with PGP/MIME. The PGP-MIME parameter creates messages in EBS/MIME format. Instruct E-Business Server to try to parse MIME body parts. To receive messages in PGP/MIME format properly, both the message "header" and message "body" need to be input to the program. Keep the name of the originally-encrypted file during a decryption operation. Only decrypt files that have been signed by a particular key. Automatically overwrite and delete all plaintext files after producing ciphertext files. Specify the number of times E-Business Server should write over a file during --wipe operations. The Files tab Use the Files tab to identify the locations of key E-Business Server files and folders. You also use this tab to enable logging for the E-Business Server Administration Utility console. Field Public key-ring Secret key-ring Groups file Command-line equivalent --pubring --secring - Random number seed file - License file - Log file - Directory for temporary files --tmp See Use to • PUBRING on page 102 • SECRING on page 103 • GROUPSFILE on page 97 • encrypt on page 116 • RANDSEED on page 103 • encrypt on page 116 • LICENSEFILE on page 100 • LOG-FILE on page 100 • TMP on page 109 • encrypt on page 116 Identify the full path and filename for your public keyring. Identify the full path and filename for your secret keyring. Specify the location of the E-Business Server groups file, pgpgroup.pgr. Identify the full path and filename for your random seed file. Specify the directory where E-Business Server's license file is stored. Specify the directory and filename for E-Business Server to use for logging. Specify the directory E-Business Server uses for temporary files. E-Business Server™ 8.6 Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188

145
E-Business Server
8.6
Product Guide
Using the E-Business Server Administration Utility
Getting Started with the E-Business Server Administration Utility console
The Files tab
Use the
Files
tab to identify the locations of key E-Business Server files and folders. You also use this tab to
enable logging for the E-Business Server Administration Utility console.
Encrypt to self
ebs --encrypt
--encrypt-to-
self
ENCRYPT-TO-SELF
on page 94
encrypt
on page 116
Add the recipient specified in the
configuration parameter
DEFAULT-KEY
to
a list of recipients for an encrypted file.
This generally ensures that you have the
ability to decrypt anything that you
encrypt for others, since the
DEFAULT-KEY
value is usually your own.
Default hash algorithm
HASH
on page 98
Define the default hash algorithm for
signing and encrypt-and-sign operations
using an RSA Legacy key.
Pass through non
E-Business Server data
while decrypting
--pass-through
PASS-THROUGH
on
page 101
Tell E-Business Server not to generate
errors if it encounters non-E-Business
Server data when decrypting.
PGP-MIME compatibility
PGP-MIME
on
page 101
Specify compatibility with PGP/MIME.
The PGP-MIME parameter creates
messages in EBS/MIME format.
Try to parse MIME body
parts
PGP-MIMEPARSE
on
page 102
Instruct E-Business Server to try to
parse MIME body parts. To receive
messages in PGP/MIME format properly,
both the message “header” and message
“body” need to be input to the program.
Preserve original filename
when decrypting
ebs --decrypt
--preserve-
name
PRESERVE-NAME
on
page 102
decrypt
on page 113
Keep the name of the
originally-encrypted file during a
decryption operation.
Only decrypt files
signed by this key
--signed-by
SIGNEDBY
on
page 104
decrypt
on page 113
Only decrypt files that have been signed
by a particular key.
Wipe temporary
plaintext files after
encryption
ebs --encrypt --wipe
WIPE
on page 110
encrypt
on page 116
Automatically overwrite and delete all
plaintext files after producing ciphertext
files.
Number of wipe passes
ebs --wipe
--wipe-passes
<number>
ebs --encrypt --wipe
--wipe-passes
WIPE-PASSES
on
page 110
encrypt
on page 116
Specify the number of times E-Business
Server should write over a file during
--wipe
operations.
Field
Command-line
equivalent
See
Use to
Public key-ring
--pubring
PUBRING
on
page 102
Identify the full path and filename for
your public keyring.
Secret key-ring
--secring
SECRING
on
page 103
Identify the full path and filename for
your secret keyring.
Groups file
GROUPSFILE
on
page 97
encrypt
on page 116
Specify the location of the E-Business
Server groups file,
pgpgroup.pgr
.
Random number seed file
RANDSEED
on
page 103
encrypt
on page 116
Identify the full path and filename for
your random seed file.
License file
LICENSEFILE
on
page 100
Specify the directory where E-Business
Server’s license file is stored.
Log file
LOG-FILE
on
page 100
Specify the directory and filename for
E-Business Server to use for logging.
Directory for temporary files
--tmp
TMP
on page 109
encrypt
on page 116
Specify the directory E-Business Server
uses for temporary files.
Field
Command-line
equivalent
See
Use to