Unified Keystore
Tutorials
These tutorials explain the tasks that can be performed
by client applications using the services provided by the unified keystore.
- Creating Keys
This section explains how to create a key using the keystore.
- Importing Keys
This section describes how to import a key from a file using the keystore.
- Exporting Keys
The keystore supports the export of keys in both plain-text and encrypted formats. The sections that follow detail the processes of exporting a public key and a private key.
- Listing Keys
This section explains how to list keys in all the keystores.
- Finding Keys
You can find a specific set of keys using the unified keystore. This section explains the process of finding keys.
- Deleting Keys
This section provides information on deleting keys.
- Changing Passphrase
This section explains how to change the passphrase.
- Performing Cryptographic Operations with Keys
- Setting Management Policies
A management policy signifies the security check required to perform management operations on the key. The management policy associated with the key is of type TSecurityPolicy. The policy can be set to check capabilities or the Vendor ID associated with the calling process. The calling process should have a WriteUserData capability.
- Setting Use Policies
A use policy denotes the security check required to use the key. The use policy associated with the key is of type TSecurityPolicy. The policy can be set to check capabilities or the Secure ID associated with the calling process. The calling process should have a WriteUserData capability.
- Retrieving Keystores
This section explains how to retrieve keystore implementations.