RSA Key Management

Refer to the RSA Keys screen to review existing RSA key configurations applied to managed devices. If an existing key does not meet the needs of a pending certificate request, generate a new key or import or export an existing key to and from a remote location.

RSA (Rivest, Shamir, and Adleman) is an algorithm for public key cryptography. It is an algorithm that can be used for certificate signing and encryption. When a device trustpoint is created, the RSA key is the private key used with the trustpoint.

To review existing device RSA key configurations, generate additional keys or import/export keys to and from remote locations:

  1. Click the Launch Manager button.

    The Certificate Management screen displays, with the Manage Certificates tab selected by default. This screen displays all existing trustpoints.

  2. Click RSA Keys.

    The RSA Keys management screen displays.

    Click to expand in new window
    Certificate Management - RSA Keys Screen
    GUID-834FFB96-A119-4C9C-AE97-12BAF327A1D3-low.png
  3. Select a listed device to review its current RSA key configuration.

    Each key can have its size and character syntax displayed. Once reviewed, optionally generate a new RSA key, import a key from a selected device, export a key to a remote location or delete a key from a selected device.

  4. Select the Generate Key button to create a new key.

    The generate RSA key window displays.

    Click to expand in new window
    Generate RSA Key Window
    GUID-23450C89-2C0C-4A37-83C6-94C3EDA53C4C-low.png
  5. Define the following configuration parameters required to generate a key:

    Key Name

    Enter the 32 character maximum name assigned to the RSA key.

    Key Size

    Use the spinner control to set the size of the key (from 2,048 or 4096 bits). It is recommended leaving this value at the default setting of 2048 to ensure optimum functionality.

  6. Select OK to generate the RSA key.

    Select Cancel to revert the screen to its last saved configuration.

  7. To optionally import a CA certificate, select the Import button from the RSA Keys screen.

    The import RSA Key window displays.

    Click to expand in new window
    Import New RSA Key Window
    GUID-30A0B4F3-2B10-4BEE-B7D2-D51054BADC3B-low.png
  8. Define the following configuration parameters required to import a RSA key:

    Key Name

    Enter the 32 character maximum name assigned to the RSA key.

    Key PassPhrase

    Define the key used by both the access point and the server (or repository) of the target RSA key. Select the Show option to expose the actual characters used in the passphrase. Leaving the Show option unselected displays the passphrase as a series of asterisks “*”.

    URL

    Provide the complete URL to the location of the RSA key. This option is only available when the Basic link is clicked.

    Protocol

    If using Advanced settings, select the protocol used for importing the target trustpoint. Available options include:
    • tftp

    • ftp

    • sftp

    • http

    • cf

    • usb1

    • usb2

    • usb3

    • usb4

    Port

    If selecting Advanced, use the spinner control to set the port. This option is not valid for cf, usb1, usb2, usb3 and usb4.

    Host

    If selecting Advanced, provide the hostname of the server used to import the RSA key. Select IPv4 Address or IPv6 Address to provide the IP address of a host device appropriately. This option is not valid for cf, usb1, usb2, usb3 and usb4.

    Username/Password

    These fields are enabled if using ftp or sftp protocols,. Specify the username and the password for that username to access the remote servers using these protocols.

    Path/File

    If selecting Advanced, specify the path to the RSA key. Enter the complete relative path to the key on the server.

  9. Select OK to import the defined RSA key.

    Select Cancel to revert the screen to its last saved configuration.

  10. To optionally export a RSA key to a remote location, select the Export button from the RSA Keys screen.

    Export the key to a RADIUS server so it can be imported without generating a second key. If there are more than one RADIUS authentication server, export the certificate and do not generate a second key unless you want to deploy two root certificates.

    The export RSA Keys window displays.

    Click to expand in new window
    Export RSA Keys Window
    GUID-D0D5B2A2-C2C1-455B-9BDC-4A202176D78A-low.png
  11. Define the following configuration parameters required to export a RSA key:

    Key Name

    Enter the 32 character maximum name assigned to the RSA key.

    Key Passphrase

    Define the key passphrase used by both the access point and the server. Select the Show option to expose the actual characters used in the passphrase. Leaving the Show option unselected displays the passphrase as a series of asterisks “*”.

    URL

    Provide the complete URL to the location of the key. This option is only available when the Basic link is clicked.

    Protocol

    If using Advanced settings, select the protocol used for importing the target trustpoint. Available options include:
    • tftp

    • ftp

    • sftp

    • http

    • cf

    • usb1

    • usb2

    • usb3

    • usb4

    Port

    If selecting Advanced, use the spinner control to set the port. This option is not valid for cf, usb1, usb2, usb3 and usb4.

    Host

    If selecting Advanced, provide the hostname of the server used to import the RSA key. Select IPv4 Address or IPv6 Address to provide the IP address of a host device appropriately. This option is not valid for cf, usb1, usb2, usb3 and usb4.

    Username/Password

    These fields are enabled if using ftp or sftp protocols,. Specify the username and the password for that username to access the remote servers using these protocols.

    Path/File

    If selecting Advanced, specify the path to the RSA key. Enter the complete relative path to the key on the server.

  12. Select OK to export the defined RSA key.

    Select Cancel to revert the screen to its last saved configuration.

    To optionally delete a key, select the Delete button from within the RSA Keys screen. Provide the key name within the Delete RSA Key screen and select the Delete Certificates option to remove the certificate and the supported key. Select OK to proceed with the deletion, or Cancel to revert back to the Certificate Management screen.