Chapter 5. Using and Configuring the Token Management System: TPS, TKS, and Enterprise Security Client
148
Generating second symmetric key . . .
Generating third symmetric key . . .
Extracting transport key from operational token . . .
transport key KCV: 444F D5C2
Storing transport key on final specified token . . .
Naming transport key "transport" . . .
Successfully generated, stored, and named the transport key!
NOTE
The
tkstool
utility prints out the KCV values for each of the three session keys
that are generated. Save them to file since these are all necessary to regenerate the
transport key if it is lost.
4. Optionally, run the
tkstool
command with the
-I
option to produce an identical transport key;
this is generally used within another set of databases which need to use identical transport keys.
tkstool -I -d . -n verify_transport
When this command is run, multiple session key shares and KCVs are generated, as with the
initial transport key generation. Write down all of this information.
5. Use the transport key to generate and wrap a master key and store it in a file called
file
.
tkstool -W -d . -n new_master -t transport -o file
Enter Password or Pin for "NSS Certificate DB":
Retrieving the transport key (for wrapping) from the specified token . . .
Generating and storing the master key on the specified token . . .
Naming the master key "wrapped_master" . . .
Successfully generated, stored, and named the master key!
Using the transport key to wrap and store the master key . . .
Writing the wrapped data (and resident master key KCV) into the
file called "file" . . .
wrapped data: 47C0 06DB 7D3F D9ED
FE91 7E6F A7E5 91B9
master key KCV: CED9 4A7B
(computed KCV of the master key residing inside the wrapped data)
6. Copy the wrapped transport key over to the appropriate locations or facility.
7. If necessary, generate new security databases on the HSM or at the facility.
tkstool -N -d
directory
8. Use the transport key to unwrap the master key stored in the file.
Summary of Contents for CERTIFICATE SYSTEM 8.0 - ADMINISTRATION
Page 42: ...20 ...
Page 43: ...Part I Setting up Certificate Services ...
Page 44: ......
Page 190: ...168 ...
Page 208: ...186 ...
Page 223: ...Part II Additional Configuration to Manage CA Services ...
Page 224: ......
Page 256: ...234 ...
Page 270: ...248 ...
Page 280: ...258 ...
Page 292: ...270 ...
Page 293: ...Part III Managing the Subsystem Instances ...
Page 294: ......
Page 408: ...386 ...
Page 438: ...416 ...
Page 439: ...Part IV References ...
Page 440: ......
Page 503: ...Netscape Defined Certificate Extensions Reference 481 OID 2 16 840 1 113730 13 ...
Page 504: ...482 ...
Page 556: ...534 ...
Page 564: ...542 ...