FIPS 140-2

The Federal Information Processing Standards (FIPS) specify federal government requirements for cryptographic modules. FIPS 140-2 is a National Institute of Standards and Technology standard.

The Security Verify Access Base components use certificates generated by the policy server to communicate securely in accordance with FIPS 140-2. The key strength and algorithms that generate FIPS 140-2 certificates are also used when Security Verify Access is not configured for a particular security mode. We can convert between these two modes without completely regenerating all the SVA certificates.

The FIPS 140-2 certificates are compatible with previous releases of ISAM. Previous releases of ISAM can communicate with ISAM 8.0 policy servers.

Federal Information Processing Standards (FIPS) that specify requirements on cryptographic modules. For information, see the National Institute of Standards and Technology website http://csrc.nist.gov/publications/PubsFIPS.html.

For information about FIPS 140-2, see http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf.

Parent topic: Security standards configurations (compliance types)