CTE Administration
This document describes the CipherTrust Manager interfaces to use CTE. The document explains the CTE concepts such as clients and client groups, signature sets, security rules, and GuardPoints. Next, the document describes how to manage clients and client groups, signature sets, security policies on the CipherTrust Manager. Finally, the document describes how to manage GuardPoints.
It is assumed, for this document, that you have already configured the CipherTrust Manager appliance. Refer to the CipherTrust Manager product documentation for instructions.
The next step is to activate and install the CTE license. Refer to Licensing for details.
After the license is installed, you can configure CTE Agents. Refer to the CTE Agent Quick Start Guide specific to your platform for details. Installation of the CTE Agents is required for protecting directories and files stored on clients.
Organization
This document contains the following sections:
Overview: Provides a high-level overview of the CTE solution.
Interfaces: Provides an overview of the CipherTrust Manager interfaces—Command Line Interface (CLI), REST Application Programming Interface (REST API), and Graphical User Interface (GUI).
Concepts: Describes CTE concepts such as clients, client groups, GuardPoints, policies, and security rules.
Data Transformation: Provides an overview of the data transformation process.
Managing Profiles: Describes how to configure client log criteria and client Syslog settings.
Managing Clients: Describes how to add, register, and manage clients on the CipherTrust Manager appliance.
Managing LDT Groups: Describes how to manage LDT groups on the CipherTrust Manager appliance.
Managing Client Groups: Describes how to manage client groups on the CipherTrust Manager appliance.
Managing Signature Sets: Describes how to create signature sets and how to sign and re-sign files in a signature set. The chapter also describes how to stop file signing and how to delete signatures and signature sets on the CipherTrust Manager appliance.
Managing Policies: Describes rules and effects of security policies, and provides instructions to create, configure, import, and export security policies on the CipherTrust Manager appliance.
Managing GuardPoints: Describes how to create, view, and delete GuardPoints on the CipherTrust Manager appliance. The chapter provides information on automatic and manual GuardPoints and provides steps to configure Windows network drives.
Operations: Describes the operations that the CTE Server Administrator performs on the CipherTrust Manager. These operations include registering CTE clients with the CipherTrust Manager, using external CA certificates, reregistering the clients, and protecting file system on a CTE client.
Common Scenarios: Describes the common encryption scenarios in which the paths can be encrypted using the CTE solution.
Reports: Describes how to generate and download CTE reports.
Troubleshooting: Describes how to handle the issues that you might face when using CTE with the CipherTrust Manager.
Integrating CTE Logging with Splunk: Describes how to integrate the CTE audit logging with Splunk.
Migrating CTE Configuration from Data Security Manager: Describes how to migrate CTE configuration from the DSM to the CipherTrust Manager.
Migration Summary: Provides a summary of the CTE resources migrated from the DSM to CipherTrust Manager, mapping of the resources that are handled differently between the two key managers. Also, the section provides any constraints applicable to the migrated resources and describes how to interpret the migration status.
Migrating ProtectFile to CipherTrust Transparent Encryption: Migrate Linux and Windows file servers, databases, clusters, etc, which are using ProtectFile for transparent encryption of data, to CipherTrust Transparent Encryption with the CM platform.
Communication with CipherTrust Manager: Describes how communication takes place between the CTE clients and CipherTrust Manager.
Permissions: Describes the complete permissions required to perform create, read, update, and delete operations on CTE resources.
API Examples: Provides examples to use CTE APIs to perform tasks such as decrypting LDT-protected GuardPoints.
API Response Codes: Describes the response codes returned by the CTE APIs with corresponding messages, and possible corrective actions to be taken for them.