i know if x509 certificate's password allows multi-passwords per certificate - or one?
and if possible, scenario applied?
thanks time.
because gnupg available me, it'd tool of choice; each admin create public/private key pair , export public portion:
gpg --gen-key gpg --export --armor [keyid] > key_file_[admin_name]
import public keys keyring of whoever 'owns' unencrypted x509 cert:
cat key_file_* | gpg --import
then encrypt cert keys:
gpg -r keyid1 -r keyid2 -r keyid3 ... -o encrypted_cert -e plaintext_cert
now encrypted_cert
can decrypted whoever has 1 of private keys and private key's passphrase:
gpg encrypted_cert
pgp job, , slight modifications commands here.
because doing encrypting single symmetric key multiple times, once each public key (and storing results in file format prepared handle multiple copies of encrypted symmetric key), easy enough re-implement in whatever language you'd like, if trial wrappers work enough.
Comments
Post a Comment