Encryption Key Management options
From the Encryption Key Management dialog box, you can perform several encryption key management tasks.
See Creating an encryption key.
See Replacing an encryption key.
See Deleting an encryption key.
Table: Encryption Key Management options
Item
|
Description
|
Key name |
Indicates the name of the encryption key.
|
Created by |
Indicates who created the encryption key. When a user creates an encryption key, Backup Exec marks that key with an identifier based on the logged-on user’s security identifier. The person who creates the key becomes the owner of the key.
|
Restricted |
Indicates if the key is a restricted key. If a key is restricted, anyone can use the key to back up data. But only the key owner or a user who knows the pass phrase can use the restricted key to restore the encrypted data.
|
Default |
Indicates whether the key is configured as the default key for the jobs that are encrypted.
|
Encryption Type |
Indicates the type of encryption that is associated with the encryption key.
|
Date Created |
Indicates the date the encryption key was created.
|
Date Last Accessed |
Indicates the date the encryption key was last accessed.
|
New |
Lets you create a new encryption key.
|
Delete |
Deletes the selected encryption key.
|
Replace |
Replaces the selected encryption key with the key you select from the Replace Encryption Key dialog.
See Replace Encryption Key options.
|
Encryption Key Management options