Security/Guidelines/Key Management: Difference between revisions

Jump to navigation Jump to search
mNo edit summary
Line 151: Line 151:
[...]
[...]
</source>
</source>
=== Protection of user keys ===
* Protected by strong passphrase.
* Never copied to another system than your own workstation/personal physical disks/tokens.
=== Protection of machine keys ===
* Storing the key material in a hardware token or HSM is preferred over simply using a strong passphrase.
* The keys must be accessible only by the admin user (root) and/or the system user requiring access.


=== Choice of algorithm ===
=== Choice of algorithm ===
Confirmed users
502

edits

Navigation menu