Framework EDI Reference. eSecurityConsole Utility | ![]() |
Key Containers |
Cryptographic Service Providers (CSP) have a database that contains records of key containers. A single key container consists of at most two public/private key pairs:
It is possible the key container may contain only one of these keys, or none at all.
The public and private key in the public/private key pair are associated. That is, if the public key is used to encrypt a document, the private key in the same key pair must be used to decrypt the document. If the private key is used to digitally sign a document, the public key in the same key pair is used to verify the document. Of the two, the private key is secret while the public key is shared.
There are two types of key containers in the system:
To display a list of key containers in the eSecurityConsole:
NOTE: In User Key Set mode, only the key containers that are accessible to the logged on user are displayed; Machine Key Set mode lists all key containers available to the local machine. Also note that some key containers available to the logged on user, may not be available to the local machine; and vice versa.
General:
Public Key Management:
Encrypting and Decrypting:
Digital Signature: