Key Recovery Process
722
Netscape Certificate Management System Installation and Setup Guide • May 2002
splitting or sharing, whereby it splits the PIN that protects the token in which the
storage key pair resides among n number of key recovery agents and reconstructs
the PIN only if m number of recovery agents provide their individual passwords; n
must be an integer greater than 1 and m must be an integer less than or equal to n.
Here’s how the m of n secret splitting mechanism gets built and works:
During the installation of a Data Recovery Manager, you generate the storage key
pair and specify the hardware token in which the key pair is to be stored. At this
time, you also specify a PIN (or password) to protect the token, the total number of
key recovery agents (n), and how many of these agents (m) are required to perform
a key recovery operation. You can change the m of n secret splitting later; for
details, see “Key Recovery Agent Scheme” on page 727.
The Data Recovery Manager splits the PIN for the token into n parts or pieces. It
then encrypts these parts with the passwords that are provided by the authorized
key recovery agents.
During the key recovery procedure, the required number of key recovery agents
(m) provide their identifiers and passwords. After verifying the passwords, the
Data Recovery Manager reconstructs the PIN for the token based on the given
information.
Interface for the Key Recovery Process
With the Key Recovery form provided in the Data Recovery Manager Agent
Services interface, key recovery agents can collectively unlock the key repository of
the Data Recovery Manager and retrieve end users’ encryption private keys and
associated certificates in a PKCS #12 package, which can then be imported into the
client. For an overview of this process, see “How Agent-Initiated Key Recovery
Works” on page 724.
Because key recovery agents use the Data Recovery Manager Agent Services
interface, agent-initiated key recovery invariably involves the Data Recovery
Manager agent and key recovery agents. The Data Recovery Manager agent’s
certificate is required to access the Key Recovery form, and key recovery agents’
passwords are required to unlock the key repository. For information on Data
Recovery Manager agents, see “Agents” on page 373.
Your organization’s PKI policy may require that the key recovery process be
restricted to authorized recovery agents only, preventing any Data Recovery
Manager agent from being involved. If so, you should ask all key recovery agents
to get client certificates and set them up as Data Recovery Manager agents. For
instructions, see “Setting Up Agents” on page 391.
Summary of Contents for NETSCAPE DIRECTORY SERVER 6.01
Page 1: ...Installation and Setup Guide Netscape Certificate Management System Version6 01 May 2002...
Page 22: ...22 Netscape Certificate Management System Installation and Setup Guide May 2002...
Page 32: ...32 Netscape Certificate Management System Installation and Setup Guide May 2002...
Page 160: ...160 Netscape Certificate Management System Installation and Setup Guide May 2002...
Page 776: ...776 Netscape Certificate Management System Installation and Setup Guide May 2002...
Page 807: ...807 Part 5 Appendix Appendix A Certificate Download Specification...
Page 808: ...808 Netscape Certificate Management System Installation and Setup Guide May 2002...
Page 830: ...830 Netscape Certificate Management System Installation and Setup Guide May 2002...