Network and File Encryption
Endpoint Privilege Management for Unix and Linux can encrypt data to help guard against attacks. Several encryption modes are supported. The installation script uses the pbkey program to create an encryption key in the key file, /etc/pb.key. This file must then be placed on all Endpoint Privilege Management for Unix and Linux systems in an Endpoint Privilege Management for Unix and Linux installation.
Because the pb.settings file is required to be in the /etc directory, the key file used to encrypt pb.settings must also be in the /etc directory.
For more information about encryption, or for about Kerberos and SSL, see the Endpoint Privilege Management for Unix and Linux Administration Guide.