Operational tasks
This chapter describes some of the most common operational procedures a User, Administrator or Security Officer can perform during normal ProtectToolkit-C operation.
Before attempting any of the procedures in this chapter, ensure that ProtectToolkit-C has been installed and configured for normal runtime use. You can find more information about the frequently-referenced command line utilities in Command-line utilities reference. Many of these functions can also be achieved with the GUI-based tools. For more information about using the GUI-based tools, see Key Management Utility (KMU) Reference and Administration Utility (gCTAdmin) reference.
This chapter contains the following sections: