Managing encryption keys in the Policy tree

In the Policy tree, object encryption is managed via policy. In the Policy object configuration, you can determine which encryption keys are used to secure which types of objects. For example, in the Policy object’s SSH User Key tab, you can select the encryption key used to secure the policy’s subordinate SSH User keys. Likewise, in the Policy object Certificate tab, you can select the encryption key used to secure the private keys associated with the policy’s subordinate Certificate objects.

IMPORTANT  The Default Encryption Key settings in the Policy object apply only to subordinate objects in the Policy tree. To define default values for Credential objects in the Credentials tree, you must define the Default Encryption Key settings in the Root Credential object. For more information, see Managing encryption keys in the Credentials Tree.

The following two sections review how to manage encryption keys in the Policy tree.