Configuring key chain management

KMS has three configuration steps:

Procedure
  1. Create a key chain entry.
  2. Assign a time-independent key or set of time-dependent keys to the Key Chain entry. The choice of key type is based on the level of security required for the protocol to which the key entry will be assigned.
  3. Assign the key chain to a KMS-enabled protocol.

This procedure is protocol-dependent. For information on a specific protocol, see the management and configuration guide for your switch.