Key Recovery Process
196
Red Hat Certificate System Administrator’s Guide • September 2005
Figure 6-2
The agent-initiated key recovery process
These are the steps shown in Figure 6-2:
1.
The Data Recovery Manager agent accesses the Key Recovery form using the
appropriate client certificate, types the identification information pertaining to the
person whose encryption private key needs to be recovered, and submits the request.
The request is submitted to the Data Recovery Manager over HTTPS.
2.
The Data Recovery Manager subjects the key recovery request to its policy checks.
3.
If the request passes all the policy rules, the Data Recovery Manager sends a
confirmation HTML page to the web browser the agent used. If the request fails any of
the policy checks, the server logs an appropriate error message.
The confirmation page contains information and input sections:
❍
The information section includes the end-entity’s information.
Summary of Contents for CERTIFICATE 7.1 ADMINISTRATOR
Page 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Page 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...