To use the Drive Security feature with a key management
server, you must create an external key that is shared by the key
management server and the secure-capable drives in the storage array.
Before
you begin
Secure-capable drives
must be installed in the array. These drives can be Full Disk Encryption
(FDE) drives or Federal Information Processing Standard (FIPS) drives.
Note: If both
FDE and FIPS drives are installed in the storage array, they all share
the same security key.
The Drive Security
feature must be enabled. Otherwise, a
Cannot Create
Security Key dialog box opens during this task. If necessary,
contact your storage vendor for instructions on enabling the Drive
Security feature.
- You have a signed client
certificate file for the storage array's controllers, and you have
copied that file to the host where you are accessing System Manager. A client certificate validates the storage array's controllers,
so the key management server can trust their Key Management Interoperability
Protocol (KMIP) requests.
- You must retrieve a certificate
file from the key management server, and then copy that file to the
host where you are accessing System Manager. A key management server certificate validates the key management
server, so the storage array can trust its IP address. You can use
a root, intermediate, or server certificate for the key management
server.
Note: For more
information about the server certificate, consult the documentation
for your key management server.
About
this task
In this task, you define the IP address of the key
management server and the port number it uses, and then load certificates
for external key management.
- Select .
- Under Security key management , select Create
External Key .
Note: If internal key management is currently configured, a dialog box
opens and asks you to confirm that you want to switch to external
key management.
The Create External Security Key dialog box opens.
- Under Connect to Key Server, enter information in the following
fields.
- Click Next .
- Under Create/Backup Key , you can create a backup key for
security purposes.
- (Recommended)
To create a backup key, keep the checkbox selected, and then enter
and confirm a pass phrase. The value can have between 8 and 32 characters,
and must include each of the following:
- An uppercase letter (one
or more). Keep in mind that the pass phrase is case sensitive.
- A number (one or more).
- A non-alphanumeric character,
such as !, *, @ (one or more).
CAUTION:
Be sure to record your entries for later use. If you need
to move a secure-enabled drive from the storage array, you must know
the pass phrase to unlock drive data.
- If you do not want to create a backup key, deselect the checkbox.
CAUTION:
Be aware
that if you lose access to the external key server and you do not
have a backup key, you will lose access to data on the drives if they
are migrated to another storage array. This option is the only method
for creating a backup key in System Manager.
- Click Finish .
The system connects to the key management server with
the credentials you entered. A copy of the security key is then stored
on your local system.
Note: The path for the downloaded
file might depend on the default download location of your browser.
- Record your
pass phrase and the location of the downloaded key file, and then
click Close .
The page displays the following message with additional
links for external key management:
Current key management method: External
- Test the connection
between the storage array and the key management server by selecting
Test Communication .
Test results display in the dialog box.
What happens
next?
When external key management is enabled, you can create
secure-enabled volume groups or pools, or you can enable security
on existing volume groups and pools.
Note: Whenever power to
the drives is turned off and then on again, all the secure-enabled
drives change to a Security Locked state. In this state, the data
is inaccessible until the controller applies the correct security
key during drive initialization. If someone physically removes a locked
drive and installs it in another system, the Security Locked state
prevents unauthorized access to its data.