Concepts
Application
An application, defined on the CipherTrust Manager, contains the necessary configurations that are required by the CADP for Java to protect or reveal data. After the application is defined, a registration token is generated. This token is required for the client to get registered with the application. Refer to Managing Applications for details.
Access Policy
Access policies contain set of rules that govern how the decrypted data will be revealed based on the user. Each access policy has a default reveal format for any user
that is not part of any user set. Access policy can act differently for different users sets. Refer to Managing Access Policy for details.
User Set
A user set is a collection of users that you want to grant or deny access to reveal data. User sets are configured in access policies. Policies can be applied to user sets, not to individual users. Refer to Managing User Set for details.
Dynamic Masking
Creates masking format for the reveal operation. Dynamic masking format determines how the output of the reveal operation is displayed to the application users. While creating this format, you can choose to show or hide characters and the masking character that will be used mask the data. By default, X is masking character. Refer to Managing Masking Formats for details.
Heartbeat
Heartbeat is a lightweight mechanism that allows CADP for Java to poll the CipherTrust Manager for any change in policies and/or configurations. Refer to Heartbeat Configuration for details. The heartbeat parameters determine the health of your CADP for Java client. Refer to Client status for details.
The time on both the client and server machines must be synchronized. To ensure this, configure NTP (Network Time Protocol) by following these instructions. If the client is still unable to fetch latest policy after time synchronization, configure the heartbeat interval value greater than the delay between the client and server.
Key Caching
The key caching allows CADP for Java to securely cache a copy of the in-use key that it received from the CipherTrust Manager, and store it for a limited time to perform cryptographic operations locally. Keys cached are stored in secured process memory only; they are not stored on disk. Only keys that are marked exportable can be cached.
Key States
A key state determines which operations can be performed using that key. Refer to Key States for details. Based on the key states, the CADP for Java will throw exceptions for the following key states.
Compromised Key State:
Cannot Protect with Compromised Key Version
Deactivated Key State:
Cannot perform operation with Deactivated Key Version