Configuring CTE for Linux with CipherTrust Manager
This section describes how to install and configure CTE on Linux systems that you plan to register with a CipherTrust Manager.
Installation Overview
The installation and configuration process when you are using CTE with a CipherTrust Manager consists of the following steps:
-
Gather the information needed for the installation and set up your network.
-
Interactive Installation on Linux
Install CTE interactively on a protected host and register the protected host with CipherTrust Manager.
Install CTE silently (non-interactive) on a protected host and register the protected host with CipherTrust Manager.
-
Installing CTE with No Key Manager Registration
Install CTE without registering to a CipherTrust Manager.
-
Use for communication between CTE and CM. Install the external certificate before registering CipherTrust Transparent Encryption with CipherTrust Manager.
-
Validating CipherTrust Manager and CipherTrust Transparent Encryption with a Local CA Certificate
Ensure that registration by the CTE agent is serviced only by the expected key manager by providing a copy of the CA certificate that will be used to authenticate the TLS communications with the key manager.
-
Register the protected host with CipherTrust Manager and make sure that CipherTrust Manager and CipherTrust Transparent Encryption can communicate with each other. This can be done as part of the initial installation or at any point after the CTE Agent has been installed.
-
Create GuardPoint to protect sensitive data.