Confirmed users
502
edits
Gdestuynder (talk | contribs) mNo edit summary |
Gdestuynder (talk | contribs) |
||
| Line 151: | Line 151: | ||
[...] | [...] | ||
</source> | </source> | ||
=== Protection of user keys === | |||
* Protected by strong passphrase. | |||
* Never copied to another system than your own workstation/personal physical disks/tokens. | |||
=== Protection of machine keys === | |||
* Storing the key material in a hardware token or HSM is preferred over simply using a strong passphrase. | |||
* The keys must be accessible only by the admin user (root) and/or the system user requiring access. | |||
=== Choice of algorithm === | === Choice of algorithm === | ||