Connecting to a Server through NAE and KMIP Session in a Single configuration
NAE and KMIP can be configured in a single properties file. To configure, set NAE_IP, NAE_Port, KMIP_IP, and
KMIP_Port in the same configuration. Rest of the configuration can be set according to the requirements.
How it Works
Remote Mode
-
NAE and KMIP with TCP protocol:
-
KMIP session throws an error.
-
NAE operations works seamlessly.
-
-
NAE and KMIP with SSL protocol:
- Both NAE and KMIP operations work seamlessly.
Local Mode
-
NAE and KMIP with TCP protocol:
-
Symmetric and Asymmetric Key cache Enabled configuration as
tcp_ok.-
KMIP session throws an error.
-
NAE works seamlessly and key is stored in cache.
-
-
-
NAE and KMIP with SSL protocol:
-
Symmetric and Asymmetric Key cache Enabled configuration as yes
-
NAE operations work seamlessly and key is stored in cache.
-
KMIP user authenticated session will throw an error for crypto operations.
-
KMIP global session will work for crypto operations.
-
-
Symmetric and Asymmetric Key cache Enabled configuration as tcp_ok
-
NAE operations will work seamlessly and key will be stored in cache.
-
KMIP user authenticated session will throw an error for crypto operations.
-
KMIP global session will work for crypto operations.
-
-
Symmetric Key cache Enabled configuration as
kmip_yes-
NAE operations work seamlessly. NAE will export key from the CipherTrust Manager and store key in cache using KMIP Get.
-
KMIP operations work seamlessly.
-
-
Asymmetric Key cache Enabled configuration as
kmip_ yes-
NAE operations work seamlessly. NAE will not export key from the CipherTrust Manager and it will fall back to remote mode.
-
KMIP operations work seamlessly.
-
-