HP-UX Trusted Computing Services A.01.00 Administrator's Guide

Restoring or Migrating the TPM.....................................................................................................25
5 On-Demand Encryption...............................................................................................27
6 EVFS Keys with HP-UX TCS..........................................................................................29
Overview...............................................................................................................................................29
User Interface........................................................................................................................................30
Configuration........................................................................................................................................31
Key Storage and Management .............................................................................................................31
7 Advanced HP-UX TCS Administration........................................................................33
Advanced HP-UX TCS System Data Backup and Restore...................................................................33
Key Management..................................................................................................................................33
Key Deletion..........................................................................................................................................35
Configuring Products Protected by HP-UX TCS on Serviceguard Clusters........................................35
8 HP-UX TCS Troubleshooting and Known Issues.........................................................37
Troubleshooting tcsd.............................................................................................................................37
Troubleshooting EVFS/HP-UX TCS Integration...................................................................................38
The tpmadm restore Command Fails...................................................................................................38
Commands Fail When Run as a Non-Privileged User.........................................................................38
Reporting Problems..............................................................................................................................38
A TSPI APIs.......................................................................................................................41
B Sample TSS Application..............................................................................................45
Glossary ..........................................................................................................................49
4 Table of Contents