© 2005 IBM Corporation TKE – Trusted Key Entry Workstation Vicente Ranieri Junior Senior Consulting IT Specialist IBM Senior Certified Professional zSeries.

Slides:



Advertisements
Similar presentations
© SafeNet Confidential and Proprietary Administering SafeNet StorageSecure Smart Card Module 3: Lesson 5 SafeNet StorageSecure Storage Security Course.
Advertisements

Chapter Five Users, Groups, Profiles, and Policies.
Presentation Heading – font Arial
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Lesson 17: Configuring Security Policies
Operating System Customization
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Managing User Settings with Group Policy
POP QUIZ!!! What kind of software is Medisoft? Name ONE of the 4 things that you can do to data in Medisoft. What is the Medisoft Program Date? What key.
11 INSTALLING WINDOWS XP Chapter 2. Chapter 2: Installing Windows XP2 INSTALLING WINDOWS XP  Prepare a computer for the installation of Microsoft Windows.
1 Web Server Administration Chapter 3 Installing the Server.
Hands-On Microsoft Windows Server 2003 Administration Chapter 4 Managing Group Policy.
Chapter 12 - Backup and Disaster Recovery1 Ch. 12 – Backups and Disaster Recovery MIS 431 – Created Spring 2006.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
A+ Guide to Software, 4e Chapter 4 Supporting Windows 2000/XP Users and Their Data.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Hands-On Microsoft Windows Server 2003 Chapter 2 Installing Windows Server 2003, Standard Edition.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Chapter 8 Chapter 8: Managing the Server Through Accounts and Groups.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 5: User Environment and Multiple Languages.
Installing software on personal computer
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Corso referenti S.I.R.A. – Modulo 2 Local Security 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
Chapter 7 Installing and Using Windows XP Professional.
Microsoft ® Official Course Module 9 Configuring Applications.
Ch 11 Managing System Reliability and Availability 1.
6. Configuring & Deploying the Desktop Thomas Lee Chief Technologist – QA.
© 2008 The McGraw-Hill Companies, Inc. All rights reserved. M I C R O S O F T ® Preparing for Electronic Distribution Lesson 14.
Overview of Active Directory Domain Services Lesson 1.
Gorman, Stubbs, & CEP Inc. Introduction to Operating Systems Lesson 5 Windows 2000 Professional.
Chapter 2: Installing and Upgrading to Windows Server 2008 R2 BAI617.
Chapter 7 Microsoft Windows XP. Windows XP Versions XP Home XP Home XP Professional XP Professional XP Professional 64-Bit XP Professional 64-Bit XP Media.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Software GCSE ICT.
Module 4: Add Client Computers and Devices to the Network.
Week #7 Objectives: Secure Windows 7 Desktop
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Subversion, an Open Source Version Control System An Introduction.
Chapter Fourteen Windows XP Professional Fault Tolerance.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
10/1/2015 Chapter 2 Installing Windows XP Professional.
1 Web Server Administration Chapter 3 Installing the Server.
University of Management & Technology 1 Operating Systems & Utility Programs.
Geo CE-XM ch 4 Edited 10/14/05 1 The XM is the newest of the rovers, and unlike other units, it comes with software installed on the unit as well as using.
Module 7: Fundamentals of Administering Windows Server 2008.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 4 Microsoft Windows XP.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Security Planning and Administrative Delegation Lesson 6.
Managing User Desktops with Group Policy
Oracle 10g Database Administrator: Implementation and Administration Chapter 2 Tools and Architecture.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
CHAPTER Creating and Managing Users and Groups. Chapter Objectives Explain the use of Local Users and Groups Tool in the Systems Tools Option to create.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Security Planning and Administrative Delegation Lesson 6.
(WINDOWS PLATFORM - ITI310 – S15)
Exploring Office 2003 Vol 1 2/e - Grauer and Barber 1 Committed to Shaping the Next Generation of IT Experts. Getting Started with Windows® XP Robert Grauer.
By Daniel Grim. What Is Windows NT? IPSEC/Windows Firewall NTFS File System Registry Permissions Managing User Accounts Conclusion Outline.
Planning Server Deployments Chapter 1. Server Deployment When planning a server deployment for a large enterprise network, the operating system edition.
1.1 Microsoft® Windows® 2003 Server Group Policy Management Prof. Abdul Hameed.
Fundamentals of Windows Mouse n 4 Basic Operations: –Pointing –Clicking –Double Clicking –Dragging.
Computers: Tools for an Information Age
Introduction to Computers
Introduction to Computers
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

© 2005 IBM Corporation TKE – Trusted Key Entry Workstation Vicente Ranieri Junior Senior Consulting IT Specialist IBM Senior Certified Professional zSeries Champions Team Member

© 2005 IBM Corporation TKE - Trusted Key Entry Workstation  Priced feature, designed for highly secure management of secure coprocessors Master Keys and operational keys – Optional Smart Card reader – Embedded closed OS  Encrypted and signed communications over TCP/IP – Listener is ICSF – End point is the coprocessor – Every command is signed and encrypted – Ethernet access only (V5)  Operational Key Entry – Key parts are loaded into crypto coprocessor card from TKE workstation – Any key type – User defined control vectors – Single, double and triple key lengths TKE (Trusted Key Entry) Workstation Overview

© 2005 IBM Corporation TKE - Trusted Key Entry Workstation  Access to secure cryptographic coprocessors is done through – Authorities (security officers) identified by their password and digital signature – Option to require multiple signatures before performing a crypto function – smart card support at TKE V4.2 and above  The TKE implements an access control mechanism that uses the roles and profiles concept – When necessary, these roles and profiles are defined by the TKE administrator using the Crypto Node Management (CNM) software facility and according to customer security policy TKE (Trusted Key Entry) Access Control

© 2005 IBM Corporation TKE - Trusted Key Entry Workstation TKE Support 9672 G5/G6, z900, z800 Secure coprocessor is CCF only 9672 G5/G6, z900, z800 Secure coprocessor are CCF and PCICC z990, z890 Secure coprocessor is PCIXCC or Crypto Express 2 IBM System z9 109 Secure coprocessor is Crypto Express 2 TKE V5

© 2005 IBM Corporation TKE - Trusted Key Entry Workstation  No desktop – Now there is a framework with two main branches for TKE (includes Applications and Utilities related toTKE) and System Management (includes Service Applications, Configuration, and Maintenance for configuring and maintaining the TKE workstation)  No command prompt –Any command line task has now been replaced by a GUI interface.  No access to directory paths – Now provide TKE related data directories for accessing files (via a File Chooser) and access to floppy and CD/DVD-RAM. – To edit a file in these data directories or on media you'll use the new Edit TKE Files task. – To manipulate these files (copy, rename, or delete) you'll use the new TKE File Management Utility task. TKE (Trusted Key Entry) Version 5

© 2005 IBM Corporation TKE - Trusted Key Entry Workstation  No TKE.INI file – Now there is a Preferences Menu on the TKE Task bar (Functions, Utilities, Help still exist). – The Preferences menu allows you to enable/disable Blind Key Entry, Floppy Drive Only, Enable Tracing, Enable Smart Card Readers, and Show ECM bits as appropriate  TKE Media Manager –For TKE related tasks to be able to use media (diskette, CD, DVD-RAM) the drive must be activated. Activation is thru the new TKE Media Manager task. If the media is not activated first, it will be automatically done for the user. –When the user is done, the drive MUST be deactivated BEFORE the media is removed or any data saved to the media could be lost. Deactivation is NOT automatically done. –If changing from one diskette to another, the floppy drive must be deactivated, media removed, new media inserted, and the drive activated again. If this is not performed data on the new diskette will not be recognized. TKE (Trusted Key Entry) Version 5…

© 2005 IBM Corporation TKE - Trusted Key Entry Workstation  Migrate TKE data from previous TKE versions – New task to be used to migrate TKE related data (Host.Dat, Group.Dat, 4758 roles and profiles, TCP/IP info, and emulator session information) from an existing TKE workstation to TKE 5.0. – Authority Signature Keys, master key parts, and operational key parts are not directly migrated but can manually be copied to diskette and then restored to the appropriate data directories using the TKE File Management Utility. TKE (Trusted Key Entry) Version 5…

© 2005 IBM Corporation TKE - Trusted Key Entry Workstation