McAfee MEJCAE-AM-DA Product Guide - Page 147
The Files tab, E-Business Server data
View all McAfee MEJCAE-AM-DA manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 147 highlights
Using the E-Business Server Administration Utility Getting Started with the E-Business Server Administration Utility console 145 Field Encrypt to self Command-line equivalent ebs --encrypt --encrypt-toself Default hash algorithm - Pass through non E-Business Server data while decrypting PGP-MIME compatibility --pass-through - Try to parse MIME body - parts Preserve original filename when decrypting Only decrypt files signed by this key ebs --decrypt --preservename --signed-by Wipe temporary plaintext files after encryption Number of wipe passes ebs --encrypt --wipe ebs --wipe --wipe-passes ebs --encrypt --wipe --wipe-passes See Use to • ENCRYPT-TO-SELF on page 94 • encrypt on page 116 • HASH on page 98 • PASS-THROUGH on page 101 • PGP-MIME on page 101 • PGP-MIMEPARSE on page 102 • PRESERVE-NAME on page 102 • decrypt on page 113 • SIGNEDBY on page 104 • decrypt on page 113 • WIPE on page 110 • encrypt on page 116 • WIPE-PASSES on page 110 • encrypt on page 116 Add the recipient specified in the configuration parameter DEFAULT-KEY to a list of recipients for an encrypted file. This generally ensures that you have the ability to decrypt anything that you encrypt for others, since the DEFAULT-KEY value is usually your own. Define the default hash algorithm for signing and encrypt-and-sign operations using an RSA Legacy key. Tell E-Business Server not to generate errors if it encounters non-E-Business Server data when decrypting. Specify compatibility with PGP/MIME. The PGP-MIME parameter creates messages in EBS/MIME format. Instruct E-Business Server to try to parse MIME body parts. To receive messages in PGP/MIME format properly, both the message "header" and message "body" need to be input to the program. Keep the name of the originally-encrypted file during a decryption operation. Only decrypt files that have been signed by a particular key. Automatically overwrite and delete all plaintext files after producing ciphertext files. Specify the number of times E-Business Server should write over a file during --wipe operations. The Files tab Use the Files tab to identify the locations of key E-Business Server files and folders. You also use this tab to enable logging for the E-Business Server Administration Utility console. Field Public key-ring Secret key-ring Groups file Command-line equivalent --pubring --secring - Random number seed file - License file - Log file - Directory for temporary files --tmp See Use to • PUBRING on page 102 • SECRING on page 103 • GROUPSFILE on page 97 • encrypt on page 116 • RANDSEED on page 103 • encrypt on page 116 • LICENSEFILE on page 100 • LOG-FILE on page 100 • TMP on page 109 • encrypt on page 116 Identify the full path and filename for your public keyring. Identify the full path and filename for your secret keyring. Specify the location of the E-Business Server groups file, pgpgroup.pgr. Identify the full path and filename for your random seed file. Specify the directory where E-Business Server's license file is stored. Specify the directory and filename for E-Business Server to use for logging. Specify the directory E-Business Server uses for temporary files. E-Business Server™ 8.6 Product Guide