Managing FRP keys FRP uses encryption keys to protect files and folders on PCs, file servers, cloud storage services, emails, and removable media such as USB drives, CD/DVDs, and ISO files. Create an encryption keyYou can create a regular encryption key, with or without an expiry date. Activate or deactivate the encryption keysActivating or deactivating an encryption key determines the key's availability on the client systems. Edit an encryption keyYou can edit properties of an existing encryption key. Delete an encryption keyYou can delete an encryption key when it is no longer active. Export encryption keysYou can export encryption keys into a password-protected .bin file. If Role Based Key Management is implemented, the exported key data includes role information. Import keys You can import encryption keys that have been exported from a different instance of FRP. The ability to import information related to Role Based Key Management depends on the version of FRP, and how the key data is exported. View key usage You can view summary information on FRP key usage on the FRP Key Management page, and drill down to view the policies, users/groups, or systems/groups where they are used. How user personal keys workUser personal keys provide the ability to create unique keys for users. Role Based Key Management Role Based Key Management enables you to compartmentalize the administration of keys and permission sets for enhanced security by allowing you to define multiple key administrators based on permission sets defined by the Global Key Administrator. Each key administrator can manage only the keys for the roles contained in the respective permission set.
Managing FRP keys FRP uses encryption keys to protect files and folders on PCs, file servers, cloud storage services, emails, and removable media such as USB drives, CD/DVDs, and ISO files. Create an encryption keyYou can create a regular encryption key, with or without an expiry date. Activate or deactivate the encryption keysActivating or deactivating an encryption key determines the key's availability on the client systems. Edit an encryption keyYou can edit properties of an existing encryption key. Delete an encryption keyYou can delete an encryption key when it is no longer active. Export encryption keysYou can export encryption keys into a password-protected .bin file. If Role Based Key Management is implemented, the exported key data includes role information. Import keys You can import encryption keys that have been exported from a different instance of FRP. The ability to import information related to Role Based Key Management depends on the version of FRP, and how the key data is exported. View key usage You can view summary information on FRP key usage on the FRP Key Management page, and drill down to view the policies, users/groups, or systems/groups where they are used. How user personal keys workUser personal keys provide the ability to create unique keys for users. Role Based Key Management Role Based Key Management enables you to compartmentalize the administration of keys and permission sets for enhanced security by allowing you to define multiple key administrators based on permission sets defined by the Global Key Administrator. Each key administrator can manage only the keys for the roles contained in the respective permission set.