Business Processes KMS Crypto
This page describes the processes and tasks that the KMS Client user performs through the KMS UI application using "KMS Crypto" (also "KMS Crypto API", "KMS Tenant Client" or "KMS Client") to create and manage cryptographic objects.
"KMS Crypto" provides methods for the following tasks:
-
Generate and manage cryptographic objects
-
Secret key for symmetric cryptography
-
Secret data for secret value sharing
-
Key pair (public key + private key) for public key cryptography
-
-
Use cryptographic objects within the application (decrypt/encrypt or sign/verify)
-
Manage own account (keycloak etc.)
The necessary identification and authentication towards the "KMS Crypto" application (KMS Crypto API, KMS (Tenant) Client) is described in the following process steps:
Process steps | |
---|---|
01 |
Call the URL of the KMS UI application with the browser, e.g. select the "Sign in" button and sign in using the username and password provided for your KMS client by the tenant (e.g., in a sealed envelope or encrypted email). For example, one possible login strategy is Keycloak. |
02 |
After a successful login, the start page ("Dashboard") is displayed. The page features various buttons and a navigation menu (sidebar), which is typical for most pages of the KMS-UI web application and the KMS Crypto application. |
03 |
It is recommended to change the randomly assigned client username and initial password to a meaningful name and a new password during the initial login. Furthermore, the personal information (e-mail, last name, first name) should be completed. To do this, proceed as follows (when using Keycloak):
|
04 |
From any page (see step 02), the desired functionality can be selected at any time. The following steps must be performed:
The functionalities offered in the sidebar depend on the selected submenu item. Some functionalities can also be selected directly by selecting the corresponding buttons. From any page, it is also possible to go back to the dashboard by clicking the "Dashboard" button, clicking on the MTG logo, or clicking on the "KMS Crypto" button. |
05 |
Other functionalities:
To use these functionalities, proceed as follows:
Alternatively, you can access the "Profile" and "Logout" functionalities from the navigation menu in the sidebar. |
06 |
Change language: To change the language of the KMS-UI web application, please select the drop-down menu in the bottom right of the footer on any page of the web application. Here you can switch between "en" for English and "de" for German. |
07 |
Search, sort and export in list views: All objects that are managed with the KMS-UI web application are displayed as lists in their corresponding "Show" view. The structure of these lists is very similar and is usually characterized by the following features:
|
P-KMS-CRP-01 - Cryptographic Objects (generate, activate, delete)
Profile | |
---|---|
Designation |
P-KMS-CRP-01 - Cryptographic Objects (generate, activate, delete) |
Purpose |
The use of secure keys is important for the application of secure cryptography. The secure generation of these cryptographic objects and their management is performed by the KMS client user, by means of the "KMS Crypto" application. To this end, any user of "KMS Crypto" can securely and reliably generate cryptographic objects such as keys and also specify a wide range of details. Available key types are secret keys for symmetric cryptography, as well as key pairs for public-key encryption. The KMS client user is responsible for the creation and management of cryptographic objects. The description of the administration of cryptographic objects is the subject of P-KMS-CRP-01. |
Responsibility |
KMS-Client |
Working tool(s) |
Browser, KMS-UI web application |
Precondition/ |
The KMS platform is up and running. The KMS Crypto user is logged into the KMS-UI application with their KMS client user account. Tenant and client are set up. |
Postcondition/ |
|
Remarks |
None |
Process steps | |||||||
---|---|---|---|---|---|---|---|
01 |
Display the list of cryptographic objects:
|
||||||
02 |
Generate secret key:
The new key is activated by default. |
||||||
03 |
Generate key pair:
The keys of the generated key pair are enabled by default. In the list of cryptographic objects (see step 01) they are listed as two keys (private key, public key). |
||||||
04 |
Generate secret data:
The new secret data is activated by default. |
||||||
05 |
Modify and manage cryptographic objects:
|
||||||
06 |
Use cryptographic objects: Secret Key (symmetric Key):
Secret Data :
Key Pair (asymmetric private and public key):
KMIP Certificate :
|
||||||
07 |
Activate a cryptographic object:
If the operation was successful, the cryptographic object has been activated.
|
||||||
08 |
Deactivate a cryptographic object:
If the operation was successful, the cryptographic object has been deactivated.
|
||||||
09 |
Reactivate a cryptographic object:
If the operation was successful, the cryptographic object has been active again.
|
||||||
10 |
Delete a cryptographic object:
If the operation was successful, the cryptographic object has been deleted.
|