Keys
Last updated
Last updated
ZTrust employs authentication protocols that necessitate cryptographic signatures and encryption.
It utilizes asymmetric Key pairs, consisting of a private key and a public key, to fulfill this requirement. Although only one key pair is actively used at any moment for generating new signatures, there are multiple passive key pairs available for verifying previous signatures. This facilitates smooth key rotation without affecting users or causing any downtime.
Click the Refresh button to see the latest settings.
You can also choose how many keys you want to display on one screen. Select your preferred option from the dropdown menu as shown above.
You can use the search box to find a specific key.
This indicates the Encryption Algorithm used to generate the Keys.
Algorithm refers to the specific format that is being used for encrypting the data.
The Active Key is the Key that is actively utilized when ZTrust is being used.
This denotes the Type of Encryption Algorithm that has been utilized.
It denotes the Key ID.
It is a sequence of characters generated using the Algorithm.
It denotes the manner in which the Key is utilized.
For example, Here, ENC signifies Encryption.
It indicates the source or origin of the Algorithms being used by ZTrust.
It indicates the time duration till which the key remains valid.
It holds the Public key utilized to authenticate the sender of an encrypted message.
It contains the Certificate that is issued to this specific provider to verify its authenticity.
If it possesses a Certificate, it is deemed valid or genuine.
You can select the keys you want to view by clicking on the dropdown menu.
In the Passive Keys section, the Keys are listed, with which there is no direct engagement or interactions. You won’t have any control over these keys.
You can use the search box to find a specific key.
Click the Refresh button to see the latest settings.
You can also choose how many keys you want to display on one screen. Select your preferred option from the dropdown menu as shown above.
It lists down the Keys that are not enabled or are not intended for use.
You can use the search box to find a specific key.
Click the Refresh button to see the latest settings.
You can also choose how many keys you want to display on one screen. Select your preferred option from the dropdown menu as shown above.
After clicking on Add provider, you will be redirected to the screen shown above.
You can move the providers up and down (by dragging the rows up and down) as per the priorities.
Within the Providers section, you have the option to generate a Key pair, along with a self-signed certificate.
It indicates the provider's display name as shown in the Admin Console.
It also displays the option chosen from the dropdown menu.
It indicates the source or origin of the Algorithms being used by ZTrust.
This specifies a concise description that can help you in identifying the purpose of the profile.
By clicking on the three dots, you will see the option to delete.
If you no longer need a provider, select Delete to remove it.
After clicking Delete, you will receive a confirmation prompt.
Click Delete to proceed with removal, or click Cancel to abort.
After clicking on Add provider, the following prompt will appear. You can select the provider you need from the options.
Select the most suitable provider option from the menu based on your requirements.
For example, rsa-generated is selected here.
This action will lead you to the following screen.
It indicates the provider's display name as shown in the Admin Console.
It also displays the option chosen from the dropdown menu.
This field pertains to the priority of the provider.
Enter any number here. The value determines whether the new Key pair becomes the Active Key pair. The highest numerical value designates the key pair as active.
This toggle button determines whether the generated Key will be enabled or disabled.
When enabled (toggled ON), the key will be enabled. It will be either Active or Passive, but it won't be Disabled.
If deactivated (toggled OFF), the key will be Disabled and will appear under the Disabled tab.
This toggle button, when enabled (toggled ON), the newly generated Key will be created as an Active Key and will appear under the Active Keys tab.
Conversely, when it's disabled (toggled OFF), the Key will be designated as a Passive key and will be visible under the Passive Keys tab.
This specifies the size of the generated Key.
You can select the preferred option from the dropdown menu as per your requirements.
This indicates the desired Algorithm for the Key.
You can click on the dropdown menu and choose the most suitable option based on your needs.
Once you've entered the details, if you wish to proceed and generate the key, simply click on the Save button.
If you prefer not to generate a key with the provided information, click on the Cancel button to discard the changes.