5 troubleshooting, 6 support and other resources, A dka encryption gui reference – HP XP7 Storage User Manual

Page 4

Advertising
background image

Workflow for restoring data encryption license keys....................................................................23

Blocking LDEVs using a file.................................................................................................24
Blocking LDEVs on the key management server......................................................................24
Restoring keys from a file....................................................................................................24
Restoring keys from a key management server........................................................................25

Selecting the data encryption license key from the View Backup Keys on Server window.........25
Selecting the data encryption license key from the Restore Keys from Server window..............25

Workflow for changing data encryption license keys...................................................................26
Workflow for deleting data encryption license keys.....................................................................26

Deleting data encryption license keys...................................................................................26
Deleting backup data encryption license keys from the server...................................................27

Viewing encryption keys backed up on the key management server...............................................27
Exporting encryption license key table information......................................................................27
Rekeying key encryption keys...................................................................................................28
Retrying Key Encryption Key Acquisition ...................................................................................28
Initialize the connection settings to the key management server.....................................................28

5 Troubleshooting........................................................................................30

Encryption events in the audit log..............................................................................................30

DKA Encryption processes that the audit log records...............................................................30

Problems and solutions............................................................................................................30

6 Support and other resources......................................................................32

Contacting HP........................................................................................................................32

Subscription service............................................................................................................32
Documentation feedback....................................................................................................32

Related information.................................................................................................................32

HP websites......................................................................................................................33

Conventions for storage capacity values....................................................................................33
Typographic conventions.........................................................................................................33

A DKA Encryption GUI Reference..................................................................35

Encryption Keys window..........................................................................................................35
Edit Encryption Environmental Settings wizard.............................................................................38

Edit Encryption Environmental Settings window......................................................................38
Confirm window in the Edit Encryption Environmental Settings wizard.......................................41

Create Keys wizard.................................................................................................................42

Create Keys window..........................................................................................................42
Confirm window in the Create Keys wizard...........................................................................43

Edit Password Policy (Backup Encryption Keys) wizard..................................................................43

Edit Password Policy (Backup Encryption Keys) window...........................................................44
Confirm window in the Edit Password Policy (Backup Encryption Keys) wizard............................45

Backup Keys to File wizard.......................................................................................................46

Backup Keys to File window................................................................................................47
Confirm window in the Backup Keys to File wizard.................................................................49

Backup Keys to Server wizard...................................................................................................49

Backup Keys to Server window............................................................................................50
Confirm window in the Backup Keys to Server wizard.............................................................51

Restore Keys from file wizard....................................................................................................51

Restore Keys from File window.............................................................................................52
Confirm window in the Restore Keys wizard...........................................................................53

Restore Keys from Server wizard...............................................................................................53

Restore Keys from Server window.........................................................................................54
Confirm window in the Restore Keys from Server wizard..........................................................55

Delete Keys wizard.................................................................................................................55

Delete Keys window...........................................................................................................56

4

Contents

Advertising
This manual is related to the following products: