RSA Product/Service Type: Forensics
RSA Version/Condition: 4.6, 5.x, 6.0
Questions that may be asked include:
1) What cryptographic algorithm was used?
2) Is there encryption key rotation or digital certificate renew in place? If yes, how often?
3) What’s the encryption key length, if symmetric key or asymmetric key, is used?
4) Does the encryption generation method or algorithm comply with X.509 standards and produce x.509 compliant keys?
Here are current best answers to the questions above.
1) What cryptographic algorithm was used? This should consider data in motion versus data at rest.
See attached document that covers the certificates and how they encrypt the data throughout the environment.
It is from v3.1 but recently confirmed with Engineering that it is still accurate.
(There is a Document Enhancement Request to update this to current versions 6.x)
2) Is there encryption key rotation or digital certificate renew in place? If yes, how often?
No, Keys are generated at install and will have to be replaced manually.
3) What’s the encryption key length if symmetric key or asymmetric key is used?
The keys created at startup are 4096 bit RSA.
4) Does the encryption generation comply with X.509 standards and produce x.509 compliant keys?
Yes.
Related Articles
Java exception error during restore of default console certificate on RSA Authentication Manager 8.2 and higher 438Number of Views FIM - FIPS 140-2 compliance. TLS1 ciphers 90Number of Views How to open TCP/IP ports in RSA Identity Governance & Lifecycle 111Number of Views How to close ports used by the RSA Authentication Agent to block SSLv3 communication to RSA Authentication Manager 8.x 386Number of Views How to generate a Certificate Signing Request (CSR) with the Subject Alternative Name (SAN) field using openssl on RSA Aut… 477Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x