Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


what is symmetric key?where do u use this?



what is symmetric key?where do u use this?..

Answer / harry

Cognos 8 components require a cryptographic provider;
otherwise they will not run. If you delete the default
cryptographic provider, you must configure another provider
to replace it.

You can configure cryptographic provider settings,
including the following:

advanced algorithms

These include signing and digest algorithms.

common symmetric key store (CSK) properties

The CSK is used by Cognos 8 to encrypt and decrypt data.

signing key store properties

The signing key pair includes the private key used to
generate the digital signature and the public key used to
verify authenticity.

encryption key store properties

The encryption key pair includes the private key used to
encrypt data and the public key used to decrypt data.

The default cryptographic provider uses keys up to 56 bits
in length for data encryption and secure sockets layer
(SSL) protocol. You can configure other cryptographic
providers which use key sizes greater than 56 bits, such as
the Enhanced Encryption Module for OpenSSL or the Enhanced
Encryption Module for Entrust, available from Cognos. For
more information, see the Enhanced Encryption Module for
OpenSSL Installation and Configuration Guide or the
Enhanced Encryption Module for Entrust Installation and
Configuration Guide.

Important: In a distributed installation, Cognos computers
communicate with Content Manager to establish trust and
obtain some cryptographic keys from Content Manager. If you
change the cryptographic keys in Content Manager, such as
by changing application servers or reinstalling Content
Manager, you must delete the cryptographic keys on the
other Cognos computers. You must then save the
configuration on each computer so that they obtain the new
cryptographic keys from Content Manager. In addition, all
Cognos 8 components in a distributed installation must be
configured with the same cryptographic provider settings.

Also, in a distributed environment, the symmetric key
should only be stored on computers where Content Manager
has been installed.

Steps for Cryptographic Settings
Start Cognos Configuration.

In the Explorer window, under Security, click Cryptography.

In the Properties window, change the default values by
clicking the Value box and then selecting the appropriate
value:

On computers that do not contain Content Manager, if you do
not want to store the CSKs locally, under CSK settings,
change Store symmetric key locally to False.

When Store symmetric key locally is False, the key is
retrieved from Content Manager when required. The Common
symmetric key store location property is ignored.

If you want the computers at both ends of a transmission to
prove their identity, under SSL Settings, change Use mutual
authentication to True.

We recommend that you do not change the Use confidentiality
setting.


If you want to change the digest algorithm, for the Digest
algorithm property, select another value.

From the File menu, click Save.

Test the cryptographic provider on a gateway computer only.
In the Explorer window, right-click Cryptography and click
Test.

Cognos 8 components check the availability of the symmetric
key.

After you configure the cryptographic provider, passwords
in your configuration and any data you create are encrypted.

Steps for Cryptographic Provider
Start Cognos Configuration.

In the Explorer window, under Security, Cryptography, click
Cognos.

If you want to change the location of the signing keys,
under Signing key settings, change the Signing key store
location property to the new location.

If you want to change the location of the encryption keys,
under Encryption key settings, change Encryption key store
location to the new location.

If you want to use a third-party certificate authority,
under Certificate Authority settings, change Use third
party CA to True.

You must also ensure that you use the same values for the -
k parameter as you used for the Signing key store location
and Encryption key store location properties.

For more information, see Configuring Cognos 8 Components
to Use a Third-party Certificate Authority.

Important: The Confidentiality algorithm value determines
how data is encrypted by Cognos 8 components. For example,
database passwords entered in Cognos Configuration are
encrypted when you save the configuration. The algorithm
selected when the data is encrypted must also be available
for the data to be decrypted at a later date.

The availability of confidentiality algorithms can change
if there are changes to your environment. For example, if
your Java Runtime Environment (JRE) has changed or if you
have installed third-party cryptographic software on the
computer. If you have made changes to a computer, such as
upgraded the JRE or installed software that has upgraded
the JRE, this may affect the availability of
confidentiality algorithms. You must ensure that the
Confidentiality algorithm that was selected when the data
was encrypted is also available when you want to access the
data.

From the File menu, click Save.

If you use a third-party Certificate Authority (CA) server,
you must now configure Cognos 8 components to use the CA.

Is This Answer Correct ?    1 Yes 1 No

Post New Answer

More Cognos Interview Questions

Explain about scorecarding?

0 Answers  


What are Governer Settings?

2 Answers  


How to create a dynamic column name in Cognos?

6 Answers   Aditya Birla, Polaris,


These are the questions asking in many interviews, so pls help me,,, How did you get requirements from the client? How did you send reports to the client? How did you interact with your client? I mean through e- mail or phone or in any other way?

2 Answers   IBM,


----------------------Diff b/w MOLAP and ROLAP?

4 Answers   Bank Of America,


My problem is as follows I made two pages of the portal; in the first page i have two reports and from one of these i would like to communicate in some way (i.e drill- through?) with the second page that contains four reports (prompt value [product] and three chart [sales revenue, sales quantity and budget]). Particularly I would like to communicate with the report that contains the prompt, passing the Product. How can i drill from the first page of the portal to the second page ? More generally, is it possible to move from one page, containing 2 report, to another page with 4 report, through a drill-through or any other mechanism? Thank in advance.

1 Answers  


How to find out OLTP data OLAP data ? i.e 5 years data is OLTP or OLAP. please anybody help me...

2 Answers   HCL, IBM,


how u provide security in power play transformer???

3 Answers   iFlex, ITC Infotech, TCS,


If you got any problems while developing the reports, then what will you do? How will you debug the problems? This question isasking in many interviews,,,, pls help me,,,

0 Answers  


Define olap designer?

0 Answers  


1.How can we driil through from a page report having query1 to list report having Query2 in master detail relationship n Drill through? 2.In database i have 50 records but when it is displayed on the report i'm getting 100 record with duplictes.How can we solve this to eliminate duplicates? 3.Exact Diff B/W Filter n Condition? 4.Render Variable? 5.I have leftouter join when right table does not have any matched records with left table what will be the output of the report whether it will be dispalying Null or blank in that particular row? 6.How to test the reports i.e Unit Testing? 7.How canwe drill through when there is no common column between the parent n child report? 8.How can we do performance tuning? I kindly request all the experts to give reply with correct answers and if possible send me some examples regarding that at srini.madhala@gmail.com

1 Answers   IBM,


What is model?

0 Answers  


Categories