Creating policies
Policies provide a hierarchical framework for managing configuration and assets within your environment, much like hierarchical directories such as Active Directory. Using policies, you apply policy settings which allow you to standardize configuration parameters and enforce security requirements throughout your encryption environment.
To create a policy
-
Log in to Policy Tree.
IMPORTANT You must have the Create permission on the Policy object where you want to create the new policy.
- Select the Policy tree from the Tree drop-down menu.
- In the Policy tree, select the Policy object where you want to create the new policy.
-
Click Add > Policy.
- Define the Policy settings.
-
Click Save/Apply.
After you create the Policy, you can configure policy settings for the Policy’s subordinate encryption objects. The following table describes the Policy configuration settings.
Field |
Description |
General |
|
Policy Name |
The name of the Policy object. |
Description |
Description for the Policy object. |
Contact |
User or Group Identity assigned to the current Policy object. Default system notifications are sent to the contact Identity. To select the Policy Contact: Click the Browse button. The Identity Selector dialog opens. If the Identity Selector dialog is not populated, enter a search query to retrieve the Identity list. The administration console does not automatically display external users and groups. You must first enter a search string so Trust Protection Platform can query the external Identity store and return the list of requested users or groups.If you want to display all user or group entries, you can enter the wildcard character (*). Select a User or Group Identity, and then click Select. Press Shift+click to select multiple, contiguous users and groups. Press Ctrl+click to select multiple, discontiguous users and groups. |
Log View |
|
Server |
The Log View Server provides the current Policy and its subordinate objects with a reference to your Default SQL Channel object. The Default SQL Channel object is the log store for the events used to populate the Log tab within each object configuration. When you install Trust Protection Platform, the root Policy is automatically configured with the default Log View Server object. The Log tab within each object configuration provides a view of all events triggered by the current object. To view events on this tab, you must configure the Log View Database Access credentials in your Default SQL Channel object. For more information, see Updating the default SQL channel object. To view the log history for the current Policy object, click the Log tab. For more information, see General configuration options. |
Processing Engines |
|
Engines |
Allows the administrator to select a specific Trust Protection Platform Server to provide monitoring, provisioning ,and validation services for the Policy’s subordinate objects. This functionality is particularly useful in heavily firewalled environments where you want the local Trust Protection Platform server at each site to manage processing for the local certificates and keys. IMPORTANT For the CSR generation setting on the certificate: When CSR generation is done by the application:
When CSR generation is not done by the application:
|