PyKMIP
latest
  • Installation
  • Changelog
  • Frequently Asked Questions
    • What algorithms are available for creating symmetric encryption keys? For asymmetric encryption keys (i.e., key pairs)?
      • Symmetric Key Algorithms
      • Asymmetric Key Algorithms
    • How does the PyKMIP server handle client identity and authentication?
    • How does the PyKMIP server manage access control for the keys and objects it stores?
    • What built-in operation policies does the PyKMIP server support?
  • Development
  • Security
  • Client
  • Server
  • Community
  • Glossary
PyKMIP
  • Docs »
  • Frequently Asked Questions
  • Edit on GitHub

Frequently Asked Questions¶

Table of Contents

  • Frequently Asked Questions
    • What algorithms are available for creating symmetric encryption keys? For asymmetric encryption keys (i.e., key pairs)?
      • Symmetric Key Algorithms
      • Asymmetric Key Algorithms
    • How does the PyKMIP server handle client identity and authentication?
    • How does the PyKMIP server manage access control for the keys and objects it stores?
    • What built-in operation policies does the PyKMIP server support?

What algorithms are available for creating symmetric encryption keys? For asymmetric encryption keys (i.e., key pairs)?¶

The KMIP specification supports a wide variety of symmetric and asymmetric key algorithms. Support for these algorithms, including corresponding key lengths, will vary across different KMIP-compliant devices, so check with your KMIP vendor or with your appliance documentation to determine which ones are available.

For a full list of the cryptographic algorithms supported by the KMIP specification, see cryptographic_algorithm. The following algorithms are supported by the PyKMIP server.

Symmetric Key Algorithms¶

  • 3DES
  • AES
  • Blowfish
  • Camellia
  • CAST5
  • IDEA
  • RC4

Asymmetric Key Algorithms¶

  • RSA

How does the PyKMIP server handle client identity and authentication?¶

See Authentication.

How does the PyKMIP server manage access control for the keys and objects it stores?¶

See Access Control.

What built-in operation policies does the PyKMIP server support?¶

See Reserved Operation Policies.

Next Previous

© Copyright 2017, Peter Hamilton Revision 0a3e3914.

Built with Sphinx using a theme provided by Read the Docs.
Read the Docs v: latest
Versions
latest
stable
Downloads
pdf
html
epub
On Read the Docs
Project Home
Builds

Free document hosting provided by Read the Docs.