KEYMAN Security key and certificate management

Syntax Development Group (SDG)

KEYMAN is a message providing for security key and certificate management. A key may be a secret key used with symmetric algorithms, or a public or private key used with asymmetric algorithms.

Header

Position
Segment
Name
Max use
  1. To head, identify and specify a message.

  2. Segment group 1
    Repeat 999
    1. To specify the relation to earlier security messages, such as response to a particular request, or request for a particular answer.

    2. To refer to the secured EDIFACT structure and its associated date and time.

    3. Segment group 2
      Repeat 9
      1. To specify the type of key management function and the status of a corresponding key or certificate.

      2. To identify a security algorithm, the technical usage made of it, and to contain the technical parameters required.

        1. S503, provides space for one parameter. The number of repetitions of S503
        actually used will depend on the algorithm used. The order of the
        parameters is arbitrary but, in each case, the actual value is preceded by
        a coded algorithm parameter qualifier.
      3. Segment group 3
        Repeat 1
        1. To convey the public key and the credentials of its owner.

        2. To identify a security algorithm, the technical usage made of it, and to contain the technical parameters required.

          1. S503, provides space for one parameter. The number of repetitions of S503
          actually used will depend on the algorithm used. The order of the
          parameters is arbitrary but, in each case, the actual value is preceded by
          a coded algorithm parameter qualifier.
        3. To contain the result of the security mechanisms.

  3. Segment group 4
    Repeat 99
    1. To specify the status of security objects, such as keys or certificates to be delivered in a list, and the corresponding list parameters.

    2. Segment group 5
      Repeat 9999
      1. To convey the public key and the credentials of its owner.

      2. To identify a security algorithm, the technical usage made of it, and to contain the technical parameters required.

        1. S503, provides space for one parameter. The number of repetitions of S503
        actually used will depend on the algorithm used. The order of the
        parameters is arbitrary but, in each case, the actual value is preceded by
        a coded algorithm parameter qualifier.
      3. To contain the result of the security mechanisms.

  4. To end and check the completeness of a message.

Stedi is a registered trademark of Stedi, Inc. Stedi's EDI Reference is provided for marketing purposes and is free of charge. All names, logos, and brands of third parties listed on our site are trademarks of their respective owners (including “X12”, which is a trademark of X12 Incorporated). Stedi, Inc. and its products and services are not endorsed by, sponsored by, or affiliated with these third parties. Our use of these names, logos, and brands is for identification purposes only, and does not imply any such endorsement, sponsorship, or affiliation.