When you first log in to the Administration Console as the Master Administrator (MA), the Summary screen for the Bootstrap wizard screen appears.
To bootstrap the system using the wizard:
The Change Password screen appears.
The Configure Global Key Label screen appears.
AuthMinder enables you to use hardware- or software-based encryption of your sensitive data. Irrespective of hardware or software encryption, the Global Key Label is used for encrypting user and organization data.
If you are using hardware encryption, then this label serves only as a reference (or pointer) to the actual 3DES key stored in the HSM device, and therefore the key label must match the HSM key label. However in case of software-based encryption, this label acts as the key.
Caution: After you complete the bootstrapping process, you can not update this key label.
The Storage Type field indicates whether the encryption key is stored in the database (Software) or the HSM (Hardware).
The Configure Default Organization screen appears.
If you choose this option, then the inbuilt authentication method provided by the Administration Console is used for authenticating the administrators.
If you choose this option, then the administrators are authenticated using their credentials that are stored in the directory service.
Note: If this mechanism is used for authenticating administrators, then you must deploy UDS, as discussed in the "Deploying User Data Service" section.
If you select the WebFort User Password option here, then the credentials are issued and authenticated by the AuthMinder Server.
Book: Refer to CA AuthMinder Administration Guide for more information about how to do this.
The Administration Console initialization is completed, as indicated in the Finish screen.
Note: If you want to localize your Administration Console, then you must prepare your Administration Console for the same, as discussed in appendix, "Preparing for Localization" for more information. After you are done with the steps for localization, then resume performing the post-installation tasks that follow.
|
Copyright © 2013 CA.
All rights reserved.
|
|