HP-UX Trusted Computing Services A.02.00 Administrator's Guide
maximum length, 33
re-establishing, 33
restoring file for, 33
specifying, 32
POP3
example with Stunnel and TCS, 48
port number
modifying for tcsd, 69
preshared keys
definition, 99
private key
protecting an existing, 44
R
reinstalling TCS, 25
removing TCS, 26
restoring
TPM keys, 31
restoring TCS data, 30
RK
defined, 16
listing, 67
listing detailed information, 68
Roaming Key (see RK)
RSA
cryptography, 99
S
secret, 32
(see also passphrase)
specifying, 32
Secure Shell (see SSH)
Serviceguard
configuring with EVFS and TCS, 64
configuring with TCS, 70
shutdown script, 87
SK
defined, 16
listing, 67
listing detailed information, 68
SMTP
example with Stunnel and TCS, 48
SRK
defined, 16
listing, 67
listing detailed information, 68
SSH
example configuration with TCS, 60
sample configuration files for TCS, 56
using with TCS, 55
version configuring with TCS, 56
version requirements for TCS, 56
startup script, 87
status
reporting for TCS, 24
Storage Root Key (see SRK)
Stunnel
examples with TCS, 45
specifying engine for, 46
specifying keys for, 46
system persistent storage
default directory, 15
specifying the directory path, 69
System Specific Storage Key (see SK)
T
TCS application keys
defined, 16
TCS EVFS keys
defined, 17
TCS on-demand encryption, 13, 35
(see also tpmencrypt)
defined, 13, 35
keys, 16
TCS RSA key pairs, 17
(see also tpmcreate)
defined, 17
tcsd
configuration file, 69
description, 12
maximum threads, 69
port number, 69
remote operatons, 69
system persistent storage, 69
telnet
example with Stunnel and TCS, 45
threads
modifying for tcsd, 69
TPM
clearing ownership, 72
password, 32
restoring, 34
TPM keys
backing up, 31
restoring, 31
tpmadm backup command, 31
tpmadm deletekeys command, 68
tpmadm restore command, 31
tpmcreate
exponent, 42
overview, 14
passphrase, 42, 57
specifying key length for, 42
syntax, 42
using for OpenSSL, 42
using with an existing RSA key pair, 44
using with SSH, 56
tpmdecrypt
event sequence, 35
keys, 16
syntax, 36
tpmencrypt
disabling password protection, 36
encryption algorithms, 36
event sequence, 35
key storage, 36
keys, 16
syntax, 36
102 Index