Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
FIPS Configuration
CSA has to be configured to be compliant with Federal Information Processing Standards (FIPS) 140-2. This section gives you detailed information on how to configure CSA for FIPS 140-2 Compliance.
For more information on the FIPS 140-2 standard see Security Requirements for Cryptographic Modules from the National Institute of Standards and Technology (NIST).
After you have configured CSA for FIPS 140-2 compliance, CSA uses or complies with the following:
- RSA BSAFE Crypto software
- Keystore and truststore: PKCS #12
- Asymmetric algorithm: RSA
- Symmetric-key algorithm: AES
- Random number generation algorithm: HMAC DRBG (128-bit)
- Hashing algorithm: SHA-256
This document provides the following information:
-
Preparing your environment. Back-up directories and files, and install required configuration applications, to prepare your CSA environment.
-
Configuring CSA. Perform CSA configuration tasks.
-
Common CSA tasks. Perform common tasks, such as stopping and restarting CSA and encrypting passwords
-
Examples Used in this Document. Reference for FIPS 140-2 items and values used in FIPS examples.
See the following guides for more information on FIPS 140-2 requirements:
- CSA technical requirements for FIPS 140-2: CSA FIPS 140-2 Compliance Statement
- Supported components and versions: Cloud Service Automation System and Software Support Matrix
- Installation: Cloud Service Automation Installation Guide
- Configuration: Cloud Service Automation Configuration Guide
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to clouddocs@hpe.com.
Help Topic ID:
Product:
Topic Title:
Feedback: