How is the RKM client cache encrypted?
--------------------------------
How are keys in cache protected?
--------------------------------
DEK = Data Encryption Key received from RKM Server
PASSWORD = Cache password
SALT = random bytes
ITERATIONS = randomly generated between 1000 and 2000
KEK = PBKDF2(PASSWORD, SALT, ITERATIONS) = Key Encryption Key
KEKIV = random bytes = Key Encryption Key Initialization Vector
DEKHASH = concat(DEK, hash(DEK)) = Concatenation of DEK and its hash for integrity check
CEK = random bytes = Cache Encryption Key
CEKIV = random bytes = Cache Encryption Key Initialization Vector
CEKHMAC = concat(CEK, hmac(CEK, KEK)) = Concatenation of CEK and its HMAC, for integrity check
-------------------
What's in the cache
-------------------
KM_Security_table.iteration_count = ITERATIONS
KM_Security_table.salt = base64_encode(SALT)
KM_Security_table.kek_iv = base64_encode(KEKIV)
KM_Security_table.cek_iv = base64_encode(CEKIV)
KM_Security_table.cek = base64_encode(aes_encrypt(CEKHMAC using KEK and KEKIV))
KM_Key_Table.key = base64_encode(aes_encrypt(DEKHASH using CEK and CEKIV))
Related Articles
Parsing Old Messages Against A New XML 38Number of Views Disk Usage Threshold Alert 6Number of Views When re-imaging SA.1.3 via idrac and getting error "copy of uudecode failed" 3Number of Views How to Move the NIC App Server in an enVision 4.0 Multi-Site 29Number of Views Data fields available in RSA Authentication Manager Security Console reports 38Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x