
Contents
1 DKA Encryption Overview...........................................................................6
DKA Encryption benefits............................................................................................................6
DKA Encryption support specifications.........................................................................................6
Primary and secondary data encryption license keys.....................................................................6
KMIP key management server support.........................................................................................7
Data encryption at the parity-group level workflow........................................................................7
Data encryption on existing data workflow..............................................................................7
Disable encrypted data workflow................................................................................................7
Change data encryption license key workflow..............................................................................8
Migration practices with encryption........................................................................................8
Audit logging of encryption events..............................................................................................8
Encryption states and protection.................................................................................................8
Interoperability with other software applications............................................................................9
2 DKA Encryption Installation........................................................................10
DKA Encryption installation workflow........................................................................................10
System requirements................................................................................................................10
Enabling the DKA Encryption feature.........................................................................................10
Assigning users to user groups.................................................................................................11
3 Key Management Server Connections.........................................................12
Key management server requirements........................................................................................12
Root and client certificates...................................................................................................12
Root certificate on the key management server..................................................................12
Client certificate password..............................................................................................12
Preparing the client certificate workflow................................................................................13
Private key file creation workflow.....................................................................................13
Creating a private SSL key file........................................................................................13
Creating a public SSL key file.........................................................................................13
Converting the client certificate to the PKCS#12 format.......................................................14
Configuring the connection settings to the key management server.......................................14
Key management server settings workflow..................................................................................14
Viewing the key management server connection settings.........................................................15
Configuring the connection settings to the key management server...........................................15
4 Managing data encryption license keys.......................................................17
Data encryption license key creation workflow............................................................................17
Creating data encryption license keys...................................................................................17
Back up secondary data encryption license key workflow........................................................17
Backing up keys as a file................................................................................................18
Backing up keys to a key management server...................................................................18
Enable data encryption at the parity-group level workflow............................................................19
Enabling data encryption at the parity-group level..................................................................19
Disable data encryption at the parity-group level workflow...........................................................20
Blocking LDEVs at the parity-group level................................................................................20
Disabling data encryption at the parity-group level.................................................................21
LDEV encryption formatting at the parity-group level...............................................................21
Unblocking LDEVs at the parity-group level............................................................................22
Moving unencrypted data to an encrypted environment workflow..................................................22
Data encryption license key restoration workflow........................................................................22
Blocking LDEVs using a file.................................................................................................23
Blocking LDEVs on the key management server......................................................................23
Restoring keys from a file....................................................................................................23
Contents 3
Komentarze do niniejszej Instrukcji