12.07.2015 Views

IRM - EMC Community Network

IRM - EMC Community Network

IRM - EMC Community Network

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

is used to decrypt it. For further information on cryptography, a good reference is the book Applied Cryptography 1by Bruce Schneier.FIPSThe <strong>IRM</strong> Server, starting with Version 4.6, is compliant with Federal Information Processing Standards 140-2(hereafter referred to as FIPS). As part of being compliant, the <strong>IRM</strong> Server uses the FIPS certified cryptographiclibrary, RSA BSAFE® Crypto-C Micro Edition via the RSA BSAFE Micro Edition Suite (MES).With Version 4.6 – 4.7, new instances created using the <strong>IRM</strong> Server operate in FIPS mode (also true for newinstances on an upgraded <strong>IRM</strong> Server). As of Version 5.0, the administrator has a choice of whether tocreate/upgrade the instance to FIPS mode. For backwards compatibility, any <strong>IRM</strong> Server instance upgraded to V4.6does not operate in FIPS mode. As stated, an <strong>IRM</strong> Server instance in FIPS mode uses only the RSA Micro EditionSuite cryptographic library. In non-FIPS mode, the <strong>IRM</strong> Server instance uses an earlier version of the RSA BSAFEcryptographic library.Besides the cryptographic library used, here are the main differences in the operation of an <strong>IRM</strong> Server instance inFIPS mode as opposed to an instance in non-FIPS mode:•A non-FIPS <strong>IRM</strong> Server instance allows the user to select Secure Socket Layer (SSL) to connect to theLDAP directory server. A FIPS <strong>IRM</strong> Server instance requires TLS to communicate with the LDAP directory server.•A FIPS <strong>IRM</strong> Server instance communicates to the <strong>IRM</strong> clients using TLS V1.0. An <strong>IRM</strong> Server in non-FIPS mode uses SSL V3.0. During an initial connection, the <strong>IRM</strong> client may try one protocol then the other toconnect to the <strong>IRM</strong> Server. The <strong>IRM</strong> client may already know which protocol to use if the client has previouslyconnected to the <strong>IRM</strong> Server or is connecting to an <strong>IRM</strong> Server as part of the process of opening protected content.•<strong>IRM</strong> clients can open content protected by <strong>IRM</strong> Server instances in FIPS mode, as well as contentprotected by <strong>IRM</strong> Servers in non-FIPS mode. However, the <strong>IRM</strong> client is not allowed to open protected contentfrom a FIPS mode <strong>IRM</strong> server while protected content from a non-FIPS <strong>IRM</strong> Server is opened, and vice versa.An <strong>IRM</strong> Server in FIPS mode and the <strong>IRM</strong> clients that support FIPS can be part of a FIPS compliant environment.Setting up a FIPS compliant environment is beyond the scope of this document, but you can find information aboutFIPS and the RSA MES product at the RSA and Federal government websites:•http://www.rsa.com•http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401val2007.htm#828•http://csrc.nist.gov/groups/STM/cavp/1 ISBN 0-471-11709-9Overview of Technical Architecture Page 8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!