Key Operations
The NAE Server allows you to perform key operations such as creating, deleting, importing, and exporting keys. You can also use the CADP for Java Provider to get information about keys that reside on the NAE Server. When creating keys you must specify the following attributes:
Name of the Key.
Key Length, if not specified, default key size is used.
Whether the key is exportable or deletable.
Owner of the key.
Permissions on the key.
Versioned key
A versioned key maintains the same key metadata (key name, owner, algorithm, key size, etc.), but has a unique set of bytes for each version. Thus, each version is different enough for encryption purposes, but similar enough to allow for easy management. A key can have a maximum of 4000 versions. Each key version has its own key bytes, default IV, state, and creation date. The state determines which operations are available for a key version. Possible states are:
Active: encryption, decryption, and all key management operations are allowed.
Restricted: only decryption operations are allowed.
Retired: no crypto operations are allowed.
The key's state and group permissions determine how the key version can be used. Ultimately, a key version can only be used when the following are true:
The key version's state permits the operation.
The key's group permissions permit the operation.
The request comes from a member of the permitted group.
In remote mode, the key information for a key is fetched only once per session from the key manager.
In this article you will learn how to: