key-manager
Syntax
key-manager {
profiles {
profile profile-name {
quantum-key-manager {
default-key-size default-key-size;
local-certificate-id local-certificate-id;
local-sae-id local-sae-id;
peer-sae-ids peer-sae-ids;
trusted-cas trusted-cas;
url url;
}
static {
key (ascii-text ascii-text | hexadecimal hexadecimal);
key-id (ascii-text ascii-text | hexadecimal hexadecimal);
}
}
}
traceoptions {
file < filename> <files number> <match regular-expression> <size maximum-file-size> <(world-readable | no-world-readable)>;
level (critical | detail | error | extensive | terse | warning);
no-remote-trace;
}
}Hierarchy Level
[edit security]
Description
You can use Junos Key Manager (JKM) to configure the static keys or dynamics keys to protect the data plane and control plane.
The JKM process acts as a key store and a proxy between the client or crypto application. The client or crypto application requires a key to establish an encrypted and authenticated quantum safe session with peer or application. The quantum safe uses the out-of-band key retrieval mechanism that lets two peers have the key. Different out-of-band mechanisms will have different protocols or methods to communicate. The JKM provides a common uniform interface for client or crypto applications to communicate.
Options
| Options | Descriptions |
|---|---|
default-key-size
default-key-size |
Define default size of keys (in bits). Set the default key size that will be used when Key Management Entity (KME) server is requested for quantum key distribution (QKD) keys. If not configured, all GET_KEYS requests must have the key size parameter set.
|
local-certificate-id
local-certificate-id |
Define local certificate identifier for client authentication. The certificate ID for the corresponding certificate retrieved from PKID during client authentication with the KME server. If the parameter is not configured, client authentication data is not provided during TLS connection setup with the KME server. If the configured URL uses HTTP, this parameter is ignored. Range: 1 to 32. If local certificate ID is not configured, the client certificate is not sent to the KME server for client authentication. |
local-sae-id
local-sae-id |
Define local SAE identifier. The KME server must generate the Secure Application entity (SAE) ID for the local application and send the QKD key(s). The KME server uses the SAE ID along with peer-sae-ids to identify the entity responsible for generating the keys. Range: 1 to 250 |
peer-sae-ids
[peer-sae-id1,
peer-sae-id2..] |
Define a list of SAE identifiers. The Key Management Entity (KME) server uses the SAE IDs for the remote applications, along with local-sae-id, as identifiers to determine the recipients of the generated quantum key distribution (QKD) keys. The server generates and transmits these keys based on the SAE IDs. Range:
If the configuration does not include peer SAE IDs, the application requesting the keys must provide the peer SAE IDs, or the key request fails. When you use the Quantum Key Manager-based key profile for VPN, you do not need to configure this parameter. |
trusted-cas
[trusted-cas1,
trusted-cas2..] |
Define a list of CA cert(s) for server certificate verification. The device considers CA(s) as valid when it performs server certification verification. If you do not configure this parameter, the system will establish an HTTPS connection with the KME Server, but it will not verify the server certificate. The device does not support wildcard-based server certificates. To verify the server certificate, ensure that the server certificate uses either a domain name or an IP address as the Common Name in the certificate. Configure the URL parameter to match the server certificate. If the server certificate is domain-name based, configure the URL with a domain name. If the server certificate is IP-address based, ensures that the URL includes the IP address. Range:
|
key (ascii-text ascii-text |
hexadecimal hexadecimal) |
A static PPK is used during IKEv2 SA quantum-safe SA negotiation as specified in RFC 8784.
|
key-id (ascii-text ascii-text |
hexadecimal hexadecimal) |
A static PPK ID is used during IKEv2 quantum safe SA negotiation as per RFC 8784.
|
url URL |
Define URL of KME server. An external HTTPS server manages Quantum Key Distribution (QKD) devices as the Key Management Entity (KME) server. A third-party vendor must provide the KME-QKD infrastructure. The server must follow ETSI specifications during its implementation. Range: 9 to 250 |
file filename <files
files> <match
match> <size
bytes> <(world-readable |
no-world-readable) |
|
level (critical | detail | error | extensive | terse |
warning) |
|
Required Privilege Level
security—To view this statement in the configuration.
security-control—To add this statement to the configuration.
Release Information
Statement introduced in Junos OS Release 22.4R1.