Connecting to a Server through NAE and KMIP Session in a Single configuration
NAE and KMIP can be configured in a single properties file. To configure, set NAE_IP
, NAE_Port
, KMIP_IP
, and KMIP_Port
in the same configuration. Rest of the configuration can be set according to the requirements.
How it Works
Remote Mode
NAE and KMIP with TCP protocol:
KMIP session throws an error.
NAE operations works seamlessly.
NAE and KMIP with SSL protocol:
- Both NAE and KMIP operations work seamlessly.
Local Mode
NAE and KMIP with TCP protocol:
Symmetric and Asymmetric Key cache Enabled configuration as
tcp_ok
.KMIP session throws an error.
NAE works seamlessly and key is stored in cache.
NAE and KMIP with SSL protocol:
Symmetric and Asymmetric Key cache Enabled configuration as yes
NAE operations work seamlessly and key is stored in cache.
KMIP user authenticated session will throw an error for crypto operations.
KMIP global session will work for crypto operations.
Symmetric and Asymmetric Key cache Enabled configuration as tcp_ok
NAE operations will work seamlessly and key will be stored in cache.
KMIP user authenticated session will throw an error for crypto operations.
KMIP global session will work for crypto operations.
Symmetric Key cache Enabled configuration as
kmip_yes
NAE operations work seamlessly. NAE will export key from the CipherTrust Manager and store key in cache using KMIP Get.
KMIP operations work seamlessly.
Asymmetric Key cache Enabled configuration as
kmip_ yes
NAE operations work seamlessly. NAE will not export key from the CipherTrust Manager and it will fall back to remote mode.
KMIP operations work seamlessly.