We are currently in the process of implementing AT-TLS, and as more vendor sites are requiring secure connections for FTP connections, we are accumulating a number of their certificates. Given this, we are looking to understand the best practices for storing these certificates. Specifically, should each vendor have its own keyring to manage their certificates independently, or is it advisable to consolidate all vendor certificates under a single 'FTP' keyring? Additionally, are there any security or management implications associated with either approach that we should consider?
In practice, it seems like the best route might be creating a policy for each vendor while also maintaining a generic FTP policy. The vendor-specific policy would have a higher priority than the general FTP client one. With each vendor policy, we can customize it to a specific keyring, but is that necessary? Can there be one master keyring to hold all the vendor certificates?
For example:
-
Keyring.IBM
-
Keyring.Broadcom
-
Keyring.BMC
Or:
-
Keyring.FTPC
-
IBMcert1
-
broadcomcert1
-
bmccert1
Any insights or recommendations on the best practice for this would be greatly appreciated.
------------------------------
Christian Gonzalez
------------------------------