McAfee MEJCAE-AM-DA Product Guide - Page 43

Implementing your Additional Decryption Keys, Deleting your key from a key server

Page 43 highlights

Managing Keys Deleting your key from a key server To prevent unauthorized additional decryption and problems with liability, your organization should enforce a policy that the key should be split and shared by two or more individuals. Consider employee turnover and ensure that ADK's are properly rejoined and re-split as necessary to retain the ADK's integrity. Caution: Do not use ADKs unless you can ensure their security. In an environment that enforces use of an ADK, security of these keys determines the security of all encrypted messages in your entire organization. Implementing your Additional Decryption Keys To implement ADKs in your environment, you must first create the ADK(s). Note: If you want separate keys for the incoming ADK and the outgoing ADK, your key generation process must explicitly specify a different ADK key (incoming) than the one specified in the configuration file (outgoing). 1 Do one of the following: • Set the incoming/outgoing ADK by specifying the ADK-KEY parameter in the configuration file, and then generate a key (the --key-gen option) that meets your needs in terms of key type and key size. or • Enter the following on the command line to specify an incoming ADK: ebs --key-gen --adk-key 2 If you want to enforce use of the ADK, set the ENFORCE-ADK parameter to ON. For more information on setting the ADK-KEY configuration parameter, see ADK-KEY on page 87. For more information on setting the ENFORCE-ADK configuration parameter, see ENFORCE-ADK on page 94. Deleting your key from a key server You can remove your key from a key server so that it is no longer available to others. To remove your key from a server, you use the --keyserver-delete option. In order to delete a key from a key server, you need to specify a signing key to digitally sign the deletion request. Depending on the key server, you may also need a signing key to set up a secure TLS connection between the client and the server. By default, E-Business Server uses the key specified by the DEFAULT-KEY parameter in the E-Business Server configuration file (see DEFAULT-KEY on page 93). If you do not want to use the default signing key, then you can specify the signing key by adding the --sign-with modifier on the command line. Additionally, you can specify the passphrase for your signing key by including the --passphrase modifier. To delete your key from a key server: 1 Enter the following command at the command line: ebs --keyserver-delete [--keyserver ] For example: ebs --keyserver-delete "John Lee" E-Business Server displays the key information and prompts you for confirmation on the deletion. 2 Enter y to delete the key. 3 Enter the passphrase for your secret key. E-Business Server includes your signature in a request that it sends to the key server to delete the key. If you are not authorized by the key server to delete the specified key or if you can't delete keys from the machine you are using, then an error message appears. 41 E-Business Server™ 8.6 Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188

41
E-Business Server
8.6
Product Guide
Managing Keys
Deleting your key from a key server
To prevent unauthorized additional decryption and problems with liability, your organization should enforce
a policy that the key should be split and shared by two or more individuals. Consider employee turnover and
ensure that ADK’s are properly rejoined and re-split as necessary to retain the ADK’s integrity.
Caution:
Do
not
use ADKs unless you can ensure their security. In an environment that enforces use of an ADK, security
of these keys determines the security of all encrypted messages in your entire organization.
Implementing your Additional Decryption Keys
To implement ADKs in your environment, you must first create the ADK(s).
Note:
If you want separate keys for the incoming ADK and the outgoing ADK, your key generation process must explicitly
specify a different ADK key (incoming) than the one specified in the configuration file (outgoing).
1
Do one of the following:
Set the incoming/outgoing ADK by specifying the
ADK-KEY
parameter in the configuration file, and then
generate a key (the
--key-gen
option) that meets your needs in terms of key type and key size.
or
Enter the following on the command line to specify an incoming ADK:
ebs --key-gen --adk-key <keyID>
2
If you want to enforce use of the ADK, set the
ENFORCE-ADK
parameter to
ON
.
For more information on setting the
ADK-KEY
configuration parameter, see
ADK-KEY
on page 87
. For more
information on setting the
ENFORCE-ADK
configuration parameter, see
ENFORCE-ADK
on page 94
.
Deleting your key from a key server
You can remove your key from a key server so that it is no longer available to others. To remove your key
from a server, you use the
--keyserver-delete
option.
In order to delete a key from a key server, you need to specify a signing key to digitally sign the deletion
request. Depending on the key server, you may also need a signing key to set up a secure TLS connection
between the client and the server.
By default, E-Business Server uses the key specified by the
DEFAULT-KEY
parameter in the E-Business Server
configuration file (see
DEFAULT-KEY
on page 93
). If you do not want to use the default signing key, then
you can specify the signing key by adding the
--sign-with
modifier on the command line.
Additionally, you can specify the passphrase for your signing key by including the
--passphrase
modifier.
To delete your key from a key server:
1
Enter the following command at the command line:
ebs --keyserver-delete <keyID or userID> [--keyserver <keyserver_URL>]
For example:
ebs --keyserver-delete “John Lee”
E-Business Server displays the key information and prompts you for confirmation on the deletion.
2
Enter
y
to delete the key.
3
Enter the passphrase for your secret key.
E-Business Server includes your signature in a request that it sends to the key server to delete the key.
If you are not authorized by the key server to delete the specified key or if you can’t delete keys from
the machine you are using, then an error message appears.