McAfee MEJCAE-AM-DA Product Guide - Page 5

Advanced Topics, Using the E-Business Server API, Using the Configuration File

Page 5 highlights

Encrypting to multiple recipients 62 Encrypting multiple files to one recipient 62 Encrypting information to a group 62 Automatically encrypting to your own key 62 Encrypting for viewing by recipient only 62 Encrypting and signing 63 Encrypting and wiping the original plaintext file 63 Creating Self-Decrypting Archives (SDAs 63 Creating PGParchives 64 Decrypting information 65 Viewing the decrypted file 65 Decrypting SDAs and PGParchives 66 9 Advanced Topics 68 Using scripts with E-Business Server 68 Using E-Business Server without interaction 68 Understanding E-Business Server exit status codes 68 Using E-Business Server as a UNIX-style filter 69 Working with ASCII and binary data 69 Encrypting and transmitting binary data 69 Sending binary data files in ASCII-armored format without encryption or signature 70 Decrypting ASCII-armored messages 70 Sending a public key in ASCII-armored format 70 Sending ASCII text files to different machine environments 70 Wiping your disk 71 Wiping a sensitive data file 71 Wiping your smart card 71 Alternative ways to work with passphrases 72 Specifying a file descriptor number 72 Storing your passphrase with PGPPASS 73 Passing your passphrase from another application 74 Working with groups 74 Creating a group 74 Add recipients to a group 75 Viewing a group 75 Remove recipients from a group 75 Removing an entire group 75 Starting the ebssdkd 75 Keeping your keyring files open with EBScache 76 10 Using the E-Business Server API 78 Library and header file organization 78 E-Business Server API functions 78 Programming with the E-Business Server API 84 Programming on Win32 84 Programming on UNIX 84 11 Using the Configuration File 86 Learning about the configuration file 86 Specifying configuration values 86 Setting configuration parameters from the command line 86 Configuration parameters 87 12 Using Command-Line Options 112 Conventions used in this section 112 Primary command-line options 112 13 Using the E-Business Server Administration Utility 136 About the E-Business Server Administration Utility 136 The E-Business Server Administration Utility interface 136 Getting Started with the E-Business Server Administration Utility console 136 Starting the E-Business Server Administration Utility 137 Adding a server 137 E-Business Server™ 8.6 Product Guide 3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188

E-Business Server
8.6
Product Guide
3
Encrypting to multiple recipients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
Encrypting multiple files to one recipient . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
Encrypting information to a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
Automatically encrypting to your own key
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
Encrypting for viewing by recipient only
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
Encrypting and signing
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63
Encrypting and wiping the original plaintext file
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63
Creating Self-Decrypting Archives (SDAs)
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63
Creating PGParchives
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64
Decrypting information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
Viewing the decrypted file
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
Decrypting SDAs and PGParchives
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66
9
Advanced Topics
68
Using scripts with E-Business Server
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68
Using E-Business Server without interaction
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68
Understanding E-Business Server exit status codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68
Using E-Business Server as a UNIX-style filter
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
Working with ASCII and binary data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
Encrypting and transmitting binary data
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
Sending binary data files in ASCII-armored format without encryption or signature
. . . . . . . . . . . . . .70
Decrypting ASCII-armored messages
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70
Sending a public key in ASCII-armored format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70
Sending ASCII text files to different machine environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70
Wiping your disk
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71
Wiping a sensitive data file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71
Wiping your smart card
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71
Alternative ways to work with passphrases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72
Specifying a file descriptor number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72
Storing your passphrase with PGPPASS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
Passing your passphrase from another application
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74
Working with groups
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74
Creating a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74
Add recipients to a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75
Viewing a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75
Remove recipients from a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75
Removing an entire group
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75
Starting the ebssdkd
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75
Keeping your keyring files open with EBScache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76
10
Using the E-Business Server API
78
Library and header file organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78
E-Business Server API functions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78
Programming with the E-Business Server API
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84
Programming on Win32 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84
Programming on UNIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84
11
Using the Configuration File
86
Learning about the configuration file
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86
Specifying configuration values
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86
Setting configuration parameters from the command line
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86
Configuration parameters
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .87
12
Using Command-Line Options
112
Conventions used in this section . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Primary command-line options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
13
Using the E-Business Server Administration Utility
136
About the E-Business Server Administration Utility
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
The E-Business Server Administration Utility interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Getting Started with the E-Business Server Administration Utility console . . . . . . . . . . . . . . . . . . . . . . . 136
Starting the E-Business Server Administration Utility
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Adding a server
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137