
Local key management
28 |
4. Key name and timeout – Give the key an appropriate name and also select the
inactivity timeout for the key from the drop-down menu. The inactivity timeout
defines how long a key can remain unused in memory. When the timeout is
reached, you’ll need to authenticate before you can access encrypted documents
again. When ready, click Next > to continue.
5. Create random input – Move the mouse and/or type the keyboard in a random
manner to create a good random input to the key to be created. When ready, click
Next > to continue.
6. Summary page – This page shows a summary of the key creation just finished.
You will find the parameters you could change listed, among some other
information that you cannot change. Click Next > to continue.
7. Logon to Endpoint Encryption – You may be asked to authenticate to Endpoint
Encryption before you can complete the wizard. The reason is that you need to
access the corporate recovery key that will be used when you create your key
store. The corporate recovery key provides for a recovery mechanism such that
you can recover your local keys if you, for example, forget your password. If you
create a key in an existing key store, then you may also need to enter the
password (or certificate PIN code) for the existing key store before you can
complete the wizard. This is all due to security.
8. Completion page – This page completes the wizard. Click Finish to close the
wizard.
Ensure you give your encryption keys unique names, ideally reflecting the purpose of
the key, e.g. My Private Key, Mail Key, Project X Key, etc. The system allows keys to
have identical names, therefore, lack of a proper naming convention may cause
confusion as to what key to use, and more importantly - what keys can safely be
deleted.
Delete Local Key…
You may delete encryption keys that are no longer used or that have been mistakenly
created. Remember, be very careful when deleting encryption keys. A deleted
encryption key cannot be recovered. Consequently, documents encrypted with a
deleted key can never again be opened.
NOTE:Again,ifenabled,usetheDeleteLocalKeyoperationverycarefully!MakesureyouusetheSearch
encrypted…function(inthesearchdialog,specifythekeyyouintendtodelete)tofindpossibledocuments
encryptedwiththekeyyouintendtodelete.
Kommentare zu diesen Handbüchern