Frequently Asked Questions¶
Table of Contents
- Frequently Asked Questions
- What algorithms are available for creating symmetric encryption keys? For asymmetric encryption keys (i.e., key pairs)?
- How does the PyKMIP server handle client identity and authentication?
- How does the PyKMIP server manage access control for the keys and objects it stores?
- What built-in operation policies does the PyKMIP server support?
What algorithms are available for creating symmetric encryption keys? For asymmetric encryption keys (i.e., key pairs)?¶
The KMIP specification supports a wide variety of symmetric and asymmetric key algorithms. Support for these algorithms, including corresponding key lengths, will vary across different KMIP-compliant devices, so check with your KMIP vendor or with your appliance documentation to determine which ones are available.
For a full list of the cryptographic algorithms supported by the KMIP specification, see cryptographic_algorithm. The following algorithms are supported by the PyKMIP server.