HP StorageWorks XP Data Integrity Check XP Software User Manual

Page 3

Advertising
background image

Contents

1 DKA Encryption Overview...........................................................................6

DKA Encryption benefits............................................................................................................6
DKA Encryption support specifications.........................................................................................6
Primary and secondary data encryption license keys.....................................................................6
KMIP key management server support.........................................................................................7
Data encryption at the parity-group level workflow........................................................................7

Data encryption on existing data workflow..............................................................................7

Disable encrypted data workflow................................................................................................7
Change data encryption license key workflow..............................................................................8

Migration practices with encryption........................................................................................8

Audit logging of encryption events..............................................................................................8
Encryption states and protection.................................................................................................8
Interoperability with other software applications............................................................................9

2 DKA Encryption Installation........................................................................10

DKA Encryption installation workflow........................................................................................10
System requirements................................................................................................................10
Enabling the DKA Encryption feature.........................................................................................10
Assigning users to user groups.................................................................................................11

3 Key Management Server Connections.........................................................12

Key management server requirements........................................................................................12

Root and client certificates...................................................................................................12

Root certificate on the key management server..................................................................12
Client certificate password..............................................................................................12

Preparing the client certificate workflow................................................................................13

Private key file creation workflow.....................................................................................13
Creating a private SSL key file........................................................................................13
Creating a public SSL key file.........................................................................................13
Converting the client certificate to the PKCS#12 format.......................................................14
Configuring the connection settings to the key management server.......................................14

Key management server settings workflow..................................................................................14

Viewing the key management server connection settings.........................................................15
Configuring the connection settings to the key management server...........................................15

4 Managing data encryption license keys.......................................................17

Data encryption license key creation workflow............................................................................17

Creating data encryption license keys...................................................................................17
Back up secondary data encryption license key workflow........................................................17

Backing up keys as a file................................................................................................18
Backing up keys to a key management server...................................................................18

Enable data encryption at the parity-group level workflow............................................................19

Enabling data encryption at the parity-group level..................................................................19

Disable data encryption at the parity-group level workflow...........................................................20

Blocking LDEVs at the parity-group level................................................................................20
Disabling data encryption at the parity-group level.................................................................21
LDEV encryption formatting at the parity-group level...............................................................21
Unblocking LDEVs at the parity-group level............................................................................22

Moving unencrypted data to an encrypted environment workflow..................................................22
Data encryption license key restoration workflow........................................................................22

Blocking LDEVs using a file.................................................................................................23
Blocking LDEVs on the key management server......................................................................23
Restoring keys from a file....................................................................................................23

Contents

3

Advertising
This manual is related to the following products: