International Business Machines Corporation
PERFORMING KEY SERVER REDUNDANCY VERIFICATION TO VERIFY A KEY IS OBTAINED FROM REDUNDANT KEY SERVERS

Last updated:

Abstract:

Provided are a computer program product, system, and method for determining key server type and key server redundancy information to enable encryption. A first key server type for a first protocol is indicated in a key server type field in response to determining a current protocol used to communicate with the key server comprises the first protocol. A query information request is submitted to the key server to determine a key server type in response to determining that the current protocol comprises the second protocol. The second key server type indicated in the response to the query information request is indicated in the key server type field in response to the response indicating the second key server type. The first or second type of key server indicated in the key server type field is used to determine information to include in a key retrieval request.

Status:
Application
Type:

Utility

Filling date:

25 May 2022

Issue date:

8 Sep 2022