Database Maintenance - Cleanup of Inactive Machines and Users for PGP Encryption Server
search cancel

Database Maintenance - Cleanup of Inactive Machines and Users for PGP Encryption Server

book

Article ID: 385473

calendar_today

Updated On:

Products

PGP Command Line PGP Encryption Suite PGP Key Management Server PGP Key Mgmt Client Access and CLI API PGP SDK Desktop Email Encryption Drive Encryption Encryption Management Server Endpoint Encryption File Share Encryption Gateway Email Encryption

Issue/Introduction

PGP Encryption Server has the capability to centrally manage users, their machines, and encryption keys, as well as recovery keys.

This article will cover the topic of how to clean up inactive users or machines. 

Resolution

The PGP Encryption Server currently has an administrative interface in which tasks and functions are managed.  The ability to manage machines and users, as well as keys for each user, or recovery keys is available from the console.  Starting with PGP Encryption Server 11.0.0 and above, many of the new features are being included in the new "SMC" console, which is the new console to invoke additional functionality previously not available.

The PGP Encryption Server manages licensing in most cases "Per user", meaning for X amount of users, you would need a license to cover the amount of seats.

If you have inactive users, these are also counted, because although inactive users may not be actively in use, they do represent historical data, that still may be important for accounting or auditing.

As this is the case, removing inactive users should be done with great care and caution.

When users are no longer active, it is recommended to review the user on a case-by-case basis.  If it is found that the user really should no longer be on the server, you can find the user in Consumers, Internal Users, and delete them manually.

If you would like the ability to programmatically remove inactive users, there are tools that may be able to facilitate with this by reaching out to Symantec Encryption Support.

If this is needed, reach out and mention this article for further guidance. 

 

 

 

Additional Information