HP Brocade 8/12c Fabric OS Encryption Administrator's Guide - Page 151

SKM or ESKM key vault high availability deployment, Disk keys and tape pool keys support

Page 151 highlights

Steps for connecting to an SKM or ESKM appliance 3 • Different user names and passwords can never be used within the same encryption group, but each encryption group may have its own user name and password. • If you change the user name and password using the -KAClogin option, the keys created by the previous user become inaccessible. The Brocade group user name and password must also be changed to the same values on the SKM/ESKM to make the keys accessible. • When storage is moved from one encryption group to another, and the new encryption group uses a different user name and password, the Brocade group user name and password must also be changed to the same values on the SKM/ESKM to make the keys accessible. SKM or ESKM key vault high availability deployment The SKM/ESKM key vault has high availability clustering capability. SKM/ESKM appliances can be clustered together in a transparent manner to the end user. Encryption keys saved to one key vault are synchronously hardened to the cluster pairs. Please refer to the HP SKM/ESKM appliance user documentation for configuration requirements and procedures. Configured primary and secondary HP SKM/ESKM appliances must be registered with the Brocade encryption switch or blade to begin key operations. The user can register only a single SKM/ESKM if desired. In that case, the HA features are lost, but the archived keys are backed up to any other non-registered cluster members. Beginning with Fabric OS v6.3.0, the primary and secondary appliances must be clustered. Both the SKM/ESKM appliances in the cluster can be registered using the following command. cryptocfg --reg -keyvault Disk keys and tape pool keys support DEK creation, retrieval, and update for disk and tape pool keys are as follows: • DEK creation - The DEK is first archived to the virtual IP address of the SKM/ESKM cluster. The request gets routed to the primary or secondary SKM/ESKM, and is synchronized with other SKMs/ESKMs in the cluster. If archival is successful, the DEK is read from both the primary or secondary SKMs/ESKMs in the cluster until the DEK is read successfully from both. If successful, then the DEK created can be used for encrypting disk LUNs or tape pool in Brocade native mode. If key archival of the DEK to the SKM/ESKM cluster fails, an error is logged and the operation is retried. If the failure happens after archival to one of the SKMs/ESKMs, but synchronization to all SKMs/ESKMs in the cluster times out, then an error is logged and the operation is retried. Any DEK archived in this case is not used. • DEK retrieval - The DEK is retrieved from the SKM/ESKM cluster using the cluster's virtual IP address. if DEK retrieval fails, it is retried. • DEK Update - DEK Update behavior is same as DEK Creation. Fabric OS Encryption Administrator's Guide 131 53-1002159-03

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282

Fabric OS Encryption Administrator’s Guide
131
53-1002159-03
Steps for connecting to an SKM or ESKM appliance
3
Different user names and passwords can never be used within the same encryption group, but
each encryption group may have its own user name and password.
If you change the user name and password using the
-KAClogin
option, the keys created by the
previous user become inaccessible. The Brocade group user name and password must also be
changed to the same values on the SKM/ESKM to make the keys accessible.
When storage is moved from one encryption group to another, and the new encryption group
uses a different user name and password, the Brocade group user name and password must
also be changed to the same values on the SKM/ESKM to make the keys accessible.
SKM or ESKM key vault high availability deployment
The SKM/ESKM key vault has high availability clustering capability. SKM/ESKM appliances can be
clustered together in a transparent manner to the end user. Encryption keys saved to one key vault
are synchronously hardened to the cluster pairs. Please refer to the HP SKM/ESKM appliance user
documentation for configuration requirements and procedures.
Configured primary and secondary HP SKM/ESKM appliances must be registered with the Brocade
encryption switch or blade to begin key operations. The user can register only a single SKM/ESKM
if desired. In that case, the HA features are lost, but the archived keys are backed up to any other
non-registered cluster members. Beginning with Fabric OS v6.3.0, the primary and secondary
appliances must be clustered.
Both the SKM/ESKM appliances in the cluster can be registered using the following command.
cryptocfg --reg -keyvault <cert label> <certfile> <hostname/ip address> <primary |
secondary>
Disk keys and tape pool keys support
DEK creation, retrieval, and update for disk and tape pool keys are as follows:
DEK creation
- The DEK is first archived to the virtual IP address of the SKM/ESKM cluster. The
request gets routed to the primary or secondary SKM/ESKM, and is synchronized with other
SKMs/ESKMs in the cluster. If archival is successful, the DEK is read from both the primary or
secondary SKMs/ESKMs in the cluster until the DEK is read successfully from both. If
successful, then the DEK created can be used for encrypting disk LUNs or tape pool in Brocade
native mode. If key archival of the DEK to the SKM/ESKM cluster fails, an error is logged and
the operation is retried. If the failure happens after archival to one of the SKMs/ESKMs, but
synchronization to all SKMs/ESKMs in the cluster times out, then an error is logged and the
operation is retried. Any DEK archived in this case is not used.
DEK retrieval
- The DEK is retrieved from the SKM/ESKM cluster using the cluster’s virtual
IP address. if DEK retrieval fails, it is retried.
DEK Update
- DEK Update behavior is same as DEK Creation.