|
| 1 | +Key Management |
| 2 | +============== |
| 3 | + |
| 4 | +Key Slots |
| 5 | +--------- |
| 6 | + |
| 7 | +The PIV application can hold certificates for different purposes. |
| 8 | +For each purpose the private key and its corresponding certificate are stored in a key slot. |
| 9 | + |
| 10 | ++-------+------------------------+-------------------------------------------------------+ |
| 11 | +| Slot | Application | Description | |
| 12 | ++=======+========================+=======================================================+ |
| 13 | +| 82-95 | Retired Key Management | The private keys and certificates in these slots were | |
| 14 | +| | | used for key management applications and are still | |
| 15 | +| | | there to provide backward compatibility. | |
| 16 | ++-------+------------------------+-------------------------------------------------------+ |
| 17 | +| 9a | Authentication | The private key and certificate in this slot | |
| 18 | +| | | are used to authenticate the cardholder. | |
| 19 | ++-------+------------------------+-------------------------------------------------------+ |
| 20 | +| 9c | Signature | The private key and certificate in this slot | |
| 21 | +| | | are used to sign emails and files. | |
| 22 | ++-------+------------------------+-------------------------------------------------------+ |
| 23 | +| 9d | Key Management | The private key and certificate in this slot | |
| 24 | +| | | are used to encrypt emails and files. | |
| 25 | ++-------+------------------------+-------------------------------------------------------+ |
| 26 | +| 9e | Card Authentication | The private key and certificate in this slot | |
| 27 | +| | | are used for physical operations, such as building | |
| 28 | +| | | access or time recording. Support from the respective | |
| 29 | +| | | system is a prerequisite. | |
| 30 | ++-------+------------------------+-------------------------------------------------------+ |
| 31 | + |
| 32 | +Algorithms |
| 33 | +---------- |
| 34 | + |
| 35 | +The PIV application uses asymmetric and symmetric algorithms. |
| 36 | +The asymmetric algorithms are used for the user private keys and the symmetric algorithms for the management key. |
| 37 | + |
| 38 | +Supported asymmetric key algorithms: |
| 39 | + |
| 40 | +* RSA 2048 |
| 41 | +* nistp256 |
| 42 | + |
| 43 | +Supported symmetric key algorithms: |
| 44 | + |
| 45 | +* AES 256 |
| 46 | +* 3DES (TDES) |
| 47 | + |
| 48 | +.. warning:: |
| 49 | + It is not recommended to use the 3DES (TDES) algorithm. |
| 50 | + |
| 51 | +Generate Key |
| 52 | +------------ |
| 53 | + |
| 54 | +The PIV application can generate a new private key on the Nitrokey. |
| 55 | + |
| 56 | +The command below will create private key in key slot `` 9a`` for the user with the subject name `` John Doe`` and subject alternative name `` [email protected]``. |
| 57 | + |
| 58 | +.. code-block:: |
| 59 | +
|
| 60 | + nitropy nk3 piv generate-key --key-slot 9a --subject-name "John Doe" --subject-alt-name-upn "[email protected]" |
0 commit comments