Requesting and installing encryption certificates - Security Center 5.7

Security Center Administrator Guide 5.7

Applies to
Security Center 5.7
Last updated
2021-12-16
Content type
Guides > Administrator guides
Language
English (United States)
Product
Security Center
Version
5.7

To authorize a client machine to view encrypted data, you must request an encryption certificate from the client machine, install the certificate with the private key locally, and hand the certificate with only the public key to the Archiver in charge of encryption.

Before you begin

There are many ways to request and manage digital certificates. Before you proceed, consult your IT department about the policies and standard procedures followed at your company.

What you should know

The encryption certificate contains a pair of public and private keys. The public key is used by the Archiver to encrypt the private data for a specific client machine. The private key is used by the client machine to decrypt the private data.
Best Practice: The private key should never leave the machine where it is needed.

Procedure

  1. Log on as a local administrator of the client machine.
  2. Add the Certificates snap-in to your local computer account.
    Installing the certificates in the local computer store gives you more control over the management of private keys.
  3. Follow your company's procedure for requesting and installing the certificate.
  4. If the client is only supposed to have access to encrypted data for a limited time, set the certificate's expiry date accordingly.
  5. If you do not plan on running the Config Tool from this computer, export the certificate with only the public key to a certificate (.cer) file.
    Save the certificate file to a location that can be accessed from where you plan on running the Config Tool.