Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
FIPS 140-2-Compliant Technologies
SA achieves FIPS 140-2 compliance by using cryptographic modules that have already gone through the NIST certification process. SA uses the following FIPS 140-2-compliant technologies.
NSS cryptographic module
SA employs the FIPS 140-2 certified Network Security Services (NSS) cryptographic module, an open-source, general purpose cryptographic library under the Mozilla Public License.
The NSS cryptographic module contains an API based on the industry standard Public-Key Cryptography Standards (PKCS) #11 cryptographic token interface version 2.20 published by RSA, the security division of EMC Corporation.
TLS/SSL transport protocol
SA also makes use of Transport Layer Security (TLS), the next generation of Secure Sockets Layer (SSL).
The SA platform is composed of multiple distributed components that communicate sensitive information over insecure networks. SSL is a proven industry standard that provides:
- Encryption to ensure that data (events/user interaction) cannot be sniffed
- Data integrity (MAC) to prevent intentional or accidental data modification on the wire
- Authentication to prevent credentials from leaking across the wire
Because the function of TLS and SSL is the same, the protocols are referred to jointly as TLS/ SSL, although they use different algorithms to establish secure key exchange.
The SSL 2.0 and 3.0 protocols are not FIPS 140-2 compliant. TLS is the only SSL variant that incorporates FIPS 140-2-approved algorithms based upon Internet Engineering Task Force (IETF) standards.
SHA-1/SHA-2 family
The Secure Hash Algorithm is a set of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS). SA uses SHA-256, but SHA-1 and other hash functions from SHA-2 family are supported.
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to hpe_sa_docs@hpe.com.
Help Topic ID:
Product:
Topic Title:
Feedback: