McAfee MEJCAE-AM-DA Product Guide - Page 34

Verifying the contents of your public keyring, Updating keys on your keyring, ADK-KEY

Page 34 highlights

Managing Keys Managing your keyring For information on how to view the contents of your smart card, see Viewing your keys on page 28. For more information on various ways to supply E-Business Server with your passphrase, see Alternative ways to work with passphrases on page 72. Verifying the contents of your public keyring E-Business Server automatically checks any new keys or signatures on your public keyring and updates all the trust parameters and validity scores. In theory, it keeps all the key validity status information up-to-date as material is added to or deleted from your public keyring. At some point, however, you may want to explicitly force E-Business Server to perform a comprehensive analysis of your public keyring, checking all the certifying signatures, checking the trust parameters, updating all the validity scores, and checking your own ultimately-trusted key against a backup copy on a write-protected floppy disk. It may be a good idea to do this hygienic maintenance periodically to make sure nothing is wrong with your public keyring. To force E-Business Server to perform a full analysis of your public keyring, use the --key-check command: ebs --key-check You can also use the following command to make E-Business Server check all the signatures for a single selected public key: ebs --key-check [] Updating keys on your keyring As you add to or change information on your key pair, it is recommended that you send your updated key to a key server so that your most current key is always available to others. Likewise, to ensure that you are always using the most current keys belonging to other E-Business Server users, you should periodically update your local keyring with the keys on a key server. To do so, enter the following at the command line: ebs --key-update [--keyserver ] E-Business Server searches the specified key server or generic LDAP server for all keys on your local keyring and merges the matching keys back into your keyring. By default, E-Business Server searches the key server specified by the KEYSERVER parameter in the E-Business Server configuration file (see KEYSERVER on page 99). To update additional key information, add various modifiers to the --key-update command using the following syntax: ebs --key-update [--adk | --keys | --revokers | --introducers | --x509 | --crl] A description of each of these modifiers is listed below: --adk updates and adds Additional Decryption Keys (ADKs) associated with a key on your keyring. If ADK-KEY is set in the E-Business Server configuration file (see ADK-KEY on page 87), then that key is also updated or added to your local keyring. --keys specifies that all keys on your keyring are updated from the key server. This is the default operation if no modifiers are supplied. --revokers specifies that all designated revokers associated with keys on your keyring are also updated from the key server. If a designated revoker's key is not currently on your keyring, E-Business Server adds it from the key server. --introducers specifies that E-Business Server updates or adds introducer keys to your keyring for all keys with meta-introducer signatures on them. E-Business Server™ 8.6 Product Guide 32

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188

E-Business Server
8.6
Product Guide
32
Managing Keys
Managing your keyring
For information on how to view the contents of your smart card, see
Viewing your keys
on page 28
. For
more information on various ways to supply E-Business Server with your passphrase, see
Alternative ways
to work with passphrases
on page 72
.
Verifying the contents of your public keyring
E-Business Server automatically checks any new keys or signatures on your public keyring and updates all
the trust parameters and validity scores. In theory, it keeps all the key validity status information up-to-date
as material is added to or deleted from your public keyring.
At some point, however, you may want to explicitly force E-Business Server to perform a comprehensive
analysis of your public keyring, checking all the certifying signatures, checking the trust parameters,
updating all the validity scores, and checking your own ultimately-trusted key against a backup copy on a
write-protected floppy disk. It may be a good idea to do this hygienic maintenance periodically to make sure
nothing is wrong with your public keyring.
To force E-Business Server to perform a full analysis of your public keyring, use the
--key-check
command:
ebs --key-check
You can also use the following command to make E-Business Server check all the signatures for a single
selected public key:
ebs --key-check <userID> [<keyring_filename>]
Updating keys on your keyring
As you add to or change information on your key pair, it is recommended that you send your updated key
to a key server so that your most current key is always available to others.
Likewise, to ensure that you are always using the most current keys belonging to other E-Business Server
users, you should periodically update your local keyring with the keys on a key server. To do so, enter the
following at the command line:
ebs --key-update [--keyserver <url>]
E-Business Server searches the specified key server or generic LDAP server for all keys on your local keyring
and merges the matching keys back into your keyring.
By default, E-Business Server searches the key server specified by the
KEYSERVER
parameter in the
E-Business Server configuration file (see
KEYSERVER
on page 99
).
To update additional key information, add various modifiers to the
--key-update
command using the
following syntax:
ebs --key-update [--adk | --keys | --revokers | --introducers | --x509 | --crl]
A description of each of these modifiers is listed below:
--adk
updates and adds Additional Decryption Keys (ADKs) associated with a key on your keyring. If
ADK-KEY
is set in the E-Business Server configuration file (see
ADK-KEY
on page 87
), then that key is also
updated or added to your local keyring.
--keys
specifies that all keys on your keyring are updated from the key server. This is the default operation
if no modifiers are supplied.
--revokers
specifies that all designated revokers associated with keys on your keyring are also updated from
the key server. If a designated revoker’s key is not currently on your keyring, E-Business Server adds it
from the key server.
--introducers
specifies that E-Business Server updates or adds introducer keys to your keyring for all keys
with meta-introducer signatures on them.