McAfee MEJCAE-AM-DA Product Guide - Page 37

Remove a signature from a key, Adding a designated revoker to your key

Page 37 highlights

Managing Keys Editing your key Note: A key must be valid in order for you to edit it's level of trust. For more information on signing someone's key, see Validity and trust on page 46. To edit trust options for your key: 1 Enter the following on the command line: ebs --key-edit --trust Your trust level options are: • Enter none, if you do not know if you trust the owner of this key to act as a trusted introducer, or if you do not trust the owner of this key. • Enter marginal, if you usually trust the owner of this key to act as a trusted introducer. • Enter complete, if you always trust the owner of this key to act as a trusted introducer. • Enter implicit, if the key is your own key. To view a key's trust level, use the --key-detail option. For more information, see Getting more information about keys on page 29. Remove a signature from a key Use the --remove-sig modifier with the --key-edit option to remove signatures from a local copy of your key. Bear in mind, however, that if others have signed a copy of your key that is residing on a public key server, the signatures will reappear on your key when you synchronize your key with the one on the key server. To remove selected signatures from a user ID on a key: 1 Enter the following on the command line: ebs --key-edit --remove-sig For example, the following would delete The Joker's signature from Adam West's key: ebs --key-edit "Adam West" --remove-sig "The Joker" Adding a designated revoker to your key It is possible that you might forget your passphrase someday or lose your private key. If this happens, then you would be unable to use your key again, and you would have no way of revoking it to show others not to encrypt to it. To safeguard against this possibility, you can appoint a third-party key revoker. The third-party you designate is then able to revoke your key just as if you had revoked it yourself. For more information on revoking keys, see Revoking a key on page 36. Note: For a key to appear revoked to another user, both the revoked key and the Designated Revoker key must be on his/her keyring. Thus, the designated revoker feature is most effective in a corporate setting, where all users' keyrings contain the company's Designated Revoker key. If the revoker's key is not present on a person's keyring, then the revoked key does not appear revoked to that user and he/she may continue to encrypt to it. Note: This feature is available for Diffie-Hellman/DSS and RSA keys. Designated revokers are not supported by RSA Legacy keys. To add a designated revoker to your key: 1 Ensure that the designated revoker's key is on your keyring. 2 Enter the following on the command line: ebs --key-edit --add-revoker

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188

35
E-Business Server
8.6
Product Guide
Managing Keys
Editing your key
Note:
A key must be valid in order for you to edit it’s level of trust. For more information on signing someone’s key, see
Validity and trust
on page 46
.
To edit trust options for your key:
1
Enter the following on the command line:
ebs --key-edit <userID> --trust <level>
Your trust level options are:
• Enter
none
, if you do not know if you trust the owner of this key to act as a trusted introducer, or if you
do not trust the owner of this key.
• Enter
marginal
, if you usually trust the owner of this key to act as a trusted introducer.
• Enter
complete
, if you always trust the owner of this key to act as a trusted introducer.
• Enter
implicit
, if the key is your own key.
To view a key’s trust level, use the
--key-detail
option. For more information, see
Getting more information
about keys
on page 29
.
Remove a signature from a key
Use the
--remove-sig
modifier with the
--key-edit
option to remove signatures from a local copy of your key.
Bear in mind, however, that if others have signed a copy of your key that is residing on a public key server,
the signatures will reappear on your key when you synchronize your key with the one on the key server.
To remove selected signatures from a user ID on a key:
1
Enter the following on the command line:
ebs --key-edit <userID of key being edited> --remove-sig <userID or keyID of signature to remove>
For example, the following would delete The Joker’s signature from Adam West’s key:
ebs --key-edit “Adam West” --remove-sig “The Joker”
Adding a designated revoker to your key
It is possible that you might forget your passphrase someday or lose your private key. If this happens, then
you would be unable to use your key again, and you would have no way of revoking it to show others not to
encrypt to it. To safeguard against this possibility, you can appoint a third-party key revoker. The third-party
you designate is then able to revoke your key just as if you had revoked it yourself. For more information
on revoking keys, see
Revoking a key
on page 36
.
Note:
For a key to appear revoked to another user, both the revoked key and the Designated Revoker key must be on
his/her keyring. Thus, the designated revoker feature is most effective in a corporate setting, where all users' keyrings
contain the company's Designated Revoker key. If the revoker’s key is not present on a person's keyring, then the revoked
key does not appear revoked to that user and he/she may continue to encrypt to it.
Note:
This feature is available for Diffie-Hellman/DSS and RSA keys. Designated revokers are not supported by RSA
Legacy keys.
To add a designated revoker to your key:
1
Ensure that the designated revoker’s key is on your keyring.
2
Enter the following on the command line:
ebs --key-edit <your userID> --add-revoker <revoker’s userID or keyID>
3
Enter your current passphrase to gain access to the key.
E-Business Server adds the designated revoker to your key.