Keys are used to protect the shared secret that is used to generate and authenticate credentials, which include ArcotID PKI, OATH OTP, ArcotID OTP-OATH, and ArcotID OTP-EMV. The key used to create and manage the ArcotID PKI is called Domain Key and the keys used to create and manage other credentials are called Master Keys.
When the user tries to authenticate using their credential, AuthMinder first checks whether the key that was used to protect the credential is valid. If the key is valid, then the user will be authenticated on providing the correct credential. Else, the user authentication fails.
By default, a key configuration is created when the AuthMinder Server is started for the first time. You can use this default configuration or create your own configuration using the keyConfigs element. You can create multiple key configurations, but only the configuration that is assigned to the credential type is used for creating credentials and authenticating those configurations. The other active configurations are used for authentication only.
The keyConfigs element is used to create the key configurations. The following table lists the key management-specific elements of this message:
|
Element |
Mandatory |
Description |
|---|---|---|
|
name |
No |
Name for the configuration. |
|
status |
No |
Indicates the status of the configuration. |
|
label |
No |
The label that will be used to store the Domain Key. |
|
keyStatus |
No |
Indicates the status of the key. Following are the supported values:
|
|
keyInHSM |
No |
Indicates whether you want to store the key in the Hardware Security Module (HSM). |
|
validity/ validityBegin and validityEnd |
No |
While creating a key, you can set a period for which the key will be valid. When the key expires, the credentials issued with that key also expires.
|
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|