Managing the null key

The Null encryption driver actually provides no encryption key at all. It gives users the option of selecting no encryption for objects, such as certificates, that do not need to be secured.

NOTE  Certificates are public information, so it is not necessary to encrypt them. Encrypting certificates simply adds unnecessary processing overhead and, depending on the number of certificates you have in your system and whether your encryption keys are stored on an HSM device, may slow your system.

The Null Encryption Driver is provided by default in the Encryption tree.

Field

Description

Description

Description for the encryption object.

Contact

User or group Identities assigned to this object.Default system notifications are sent to the contact identities.

Default contact = master administrator

To select the object contacts:

Click the Browse button.

The Identity Selector dialog opens.

If the Identity Selector dialog is not populated, enter a search query to retrieve the Identity list. The administration console does not automatically display external users and groups. You must first enter a search string so Trust Protection Platform can query the external Identity store and return the list of requested users or groups.If you want to display all user or group entries, you can enter the wildcard character (*).

Select a User or Group Identity, and then click Select.

Press Shift+click to select multiple, contiguous users and groups.

Press Ctrl+click to select multiple, discontiguous users and groups.

General Tab

Log Tab

Provides a view of all events triggered for the current object.

An administrator must have a minimum of the Read permission to view this tab.

For more information on the Log tab options, see Viewing log events.

Permissions

On the Permissions tab, you select the users or groups to whom you want to grant permissions to the current object. Then, you select which permissions you want the users or groups to have. You can also manage object permissions via parent objects, including the root Platform object or the Trust Protection Platform server object (found in the Platforms tree).

If you configure Permissions in a parent object, those permissions are inherited by all subordinate objects.