Quick Reference Guide
Contents
Notes, Cautions, and Warnings...................................................................................................2
1 Overview.......................................................................................................................................5
Hardware and Software Requirements....................................................................................................................5
Server Hardware Requirements........................................................................................................................5
Browser Requirements......................................................................................................................................6
Operating System Requirements........................................................................................................................6
2 Installing EKM 3.0........................................................................................................................7
Preparing for the Installation of EKM 3.0 in Microsoft Windows.............................................................................7
Preparing for the Installation of EKM 3.0 in Red Hat Enterprise Linux.....................................................................8
Preparing for the Installation of EKM 3.0 in SUSE Linux Enterprise Server.............................................................8
Performing the EKM 3.0 Installation Procedure.......................................................................................................9
3 Setting up Primary and Secondary EKM 3.0 Servers..........................................................13
Installing EKM 3.0 on the Primary Server...............................................................................................................13
Using EKM 3.0 on the Primary Server.....................................................................................................................13
Installing EKM 3.0 on the Secondary Server..........................................................................................................13
Using EKM 3.0 on the Secondary Server................................................................................................................14
Uninstalling EKM 3.0 from the Primary and Secondary Servers............................................................................14
4 Performing Backups and Restoring from a Backup............................................................15
Creating a Backup of the Keystore.........................................................................................................................15
Restoring from a Backup........................................................................................................................................16
5 Using EKM 3.0............................................................................................................................17
Logging into the Encryption Key Manager 3.0 Portal.............................................................................................17
Creating a Master Keystore....................................................................................................................................18
Enabling the Firewall in the EKM 3.0 Server...........................................................................................................18
Configuring EKM 3.0 to Accept Devices that Contact EKM 3.0 for Keys................................................................19
Creating a Device Group.........................................................................................................................................19
Creating Key Groups for a Device Group................................................................................................................20
Adding a Device to a Device Group........................................................................................................................21
Adding and Deleting Keys to and from Key Groups................................................................................................21
Deleting Key Groups...............................................................................................................................................22
Verifying the Server Certificate..............................................................................................................................23
Viewing the Server Certificate Details.............................................................................................................23
Logging onto the WebSphere Server.....................................................................................................................23