McAfee MEJCAE-AM-DA Product Guide - Page 30

Managing Keys, Managing your keyring, Viewing your keys

Page 30 highlights

5 Managing Keys Key management is the secure administration of keys or keyrings. Administrative tasks you might perform on your keys include the following: To: List the keys on your keyring Remove keys from your keyring Verify the contents of your keyring Update keys on your keyring using a key server Add or change user IDs on your key Add a designated revoker to your key Change your passphrase Change trust parameters Remove a signature from your key Add or remove photo IDs Disable/enable your key Revoke your key Split and rejoin your key Create additional decryption keys (ADKs) Delete your key from a key server Reconstruct your key See: Viewing your keys on page 28 Removing keys from your keyring on page 30 Verifying the contents of your public keyring on page 32 Updating keys on your keyring on page 32 Adding and removing user IDs on page 33 Adding a designated revoker to your key on page 35 Changing your passphrase on page 34 Editing trust options for your key on page 34 Remove a signature from a key on page 35 Adding and removing photo IDs on page 36 Disabling and enabling a key on page 37 Revoking a key on page 36 Splitting and rejoining a key on page 37 Additional Decryption Keys on page 40 Deleting your key from a key server on page 41 Reconstructing your key on page 42 Managing your keyring You may accumulate many keys in the course of using E-Business Server. Over time, you may want to view, update, or remove the keys on the keyring. Note: All operations on your keyrings actually apply to both keyrings at once. E-Business Server cannot open just the private keyring or just the public keyring. Viewing your keys Viewing your keys is the most basic key management operation. You can list them using variations of the --key-list option. The key list includes the following information for each key: algorithm, type, size, flags, key ID, and primary user ID. For a better understanding of the information and flags displayed in a key list operation and for examples of the various --key-list options, see Understanding Key List Displays. To list all the keys-private and public-on your default keyring use the following syntax: ebs --key-list E-Business Server lists all the keys on your keyring. Public keys are represented with "pub" in the Type column, and key pairs are represented with "pair" in the Type column. To display specific keys on your keyring, specify the user IDs using the following syntax. ebs --key-list ... For example: E-Business Server™ 8.6 Product Guide 28

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188

E-Business Server
8.6
Product Guide
28
5
Managing Keys
Key management
is the secure administration of keys or keyrings. Administrative tasks you might perform
on your keys include the following:
Managing your keyring
You may accumulate many keys in the course of using E-Business Server. Over time, you may want to view,
update, or remove the keys on the keyring.
Note:
All operations on your keyrings actually apply to
both
keyrings at once. E-Business Server cannot open just the
private keyring or just the public keyring.
Viewing your keys
Viewing your keys is the most basic key management operation. You can list them using variations of the
--key-list
option. The key list includes the following information for each key: algorithm, type, size, flags,
key ID, and primary user ID.
For a better understanding of the information and flags displayed in a key list operation and for examples of
the various
--key-list
options, see
Understanding Key List Displays
.
To list all the keys—private and public—on your default keyring use the following syntax:
ebs --key-list
E-Business Server lists all the keys on your keyring. Public keys are represented with “
pub
” in the
Type
column, and key pairs are represented with “
pair
” in the
Type
column.
To display specific keys on your keyring, specify the user IDs using the following syntax.
ebs --key-list <userID1> <userID2> <userID3>...
For example:
To:
See:
List the keys on your keyring
Viewing your keys
on page 28
Remove keys from your keyring
Removing keys from your keyring
on page 30
Verify the contents of your keyring
Verifying the contents of your public keyring
on page 32
Update keys on your keyring using a key
server
Updating keys on your keyring
on page 32
Add or change user IDs on your key
Adding and removing user IDs
on page 33
Add a designated revoker to your key
Adding a designated revoker to your key
on page 35
Change your passphrase
Changing your passphrase
on page 34
Change trust parameters
Editing trust options for your key
on page 34
Remove a signature from your key
Remove a signature from a key
on page 35
Add or remove photo IDs
Adding and removing photo IDs
on page 36
Disable/enable your key
Disabling and enabling a key
on page 37
Revoke your key
Revoking a key
on page 36
Split and rejoin your key
Splitting and rejoining a key
on page 37
Create additional decryption keys (ADKs)
Additional Decryption Keys
on page 40
Delete your key from a key server
Deleting your key from a key server
on page 41
Reconstruct your key
Reconstructing your key
on page 42