
Local key management
| 27
Create Local Key…
This option starts a wizard that creates an encryption key. The encryption keys are
stored in so-called “Key Stores”. Each Key Store is protected with either a password
that you select (password token), or with your digital certificate (PKI token). You will
select the proper token when you create the key store.
Your Key Store may be stored either on your computer’s hard disk, or on a removable
storage media, typically a USB memory stick. It is possible to have one Key Store on
the hard disk and another on removable storage, where each Key Store holds different
keys.
If there are no Key Stores available when you select this menu entry, the wizard will
help you to first create a Key Store.
The Create Local Key Wizard
The following steps constitute the Create Local Key… wizard:
1. Welcome dialog – The opening dialog presents some information about what the
wizard will accomplish. Click Next > to continue.
2. Select storage location – Select where you want to place your key store from
the drop-down menu. If you want to place the key store on a USB memory stick,
then make sure the drive is inserted before you start this wizard. When ready,
click the button Next > to continue.
3. Choose protection mechanism – If you create a new key store, you will be
asked to select how you want to protect this key store. There are two options: a)
passwords or b) digital certificates. Only select (b) if you have a digital certificate
available. Depending on if you select (a) or (b), the next dialog will differ.
• Password protected – You will be asked to enter the password you want
to use. Confirm the password and click Next > to continue. Note that the
same password quality rules apply as for your normal Endpoint Encryption
password, e.g. if your Endpoint Encryption password must contain at least
two numbers, then the password for your local keys must also contain at
least two numbers.
• Certificate protected – Select the certificate you want to use from the
list of available certificates. If you do not have a certificate available, the
list will be empty. If so, consult your IT Administrator for information
about what certificates you should have access to. Select the certificate
you want to use and then click Next > to continue.
Comentarios a estos manuales