HP Brocade 8/12c Fabric OS Encryption Administrator's Guide - Page 48

Registering the SKM or ESKM Brocade group user name and password, Con gt; Encryption

Page 48 highlights

2 Steps for connecting to an SKM or ESKM appliance Registering the SKM or ESKM Brocade group user name and password The Brocade group user name and password you created when configuring a Brocade group on SKM/ESKM must also be registered on each Brocade encryption node. NOTE This operation can be performed only after the switch is added to the encryption group. 1. Select Configure > Encryption from the menu task bar. 2. The Encryption Center dialog box displays. 3. Select a switch from the Encryption Center Devices table, then select Switch > Key Vault Credentials, or right-click a switch and select Key Vault Credentials. The Key Vault Credentials dialog box displays. FIGURE 15 Key Vault Credentials dialog box 4. Enter the Brocade group user name and password. Keep the following rules in mind when registering the Brocade user name and password: - The user name and password must match the user name and password specified for the Brocade group. - The same user name and password must be configured on all nodes in an encryption group. This is not enforced or validated by the encryption group members, so care must be taken when configuring the user name and password to ensure they are the same on each node. - Different user names and passwords can never be used within the same encryption group, but each encryption group may have its own user name and password. - If you change the user name and password, the keys created by the previous user become inaccessible. The Brocade group user name and password must also be changed to the same values on SKM/ESKM to make the keys accessible. - When storage is moved from one encryption group to another, and the new encryption group uses different user name and password, the Brocade group user name and password must also be changed to the same values on SKM/ESKM to make the keys accessible. 5. Repeat the procedure for each node. 28 Fabric OS Encryption Administrator's Guide 53-1002159-03

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282

28
Fabric OS Encryption Administrator’s Guide
53-1002159-03
Steps for connecting to an SKM or ESKM appliance
2
Registering the SKM or ESKM Brocade group user name and password
The Brocade group user name and password you created when configuring a Brocade group on
SKM/ESKM must also be registered on each Brocade encryption node.
NOTE
This operation can be performed only after the switch is added to the encryption group.
1.
Select
Configure > Encryption
from the menu task bar.
2.
The
Encryption Center
dialog box displays.
3.
Select a switch from the
Encryption Center Devices
table, then select
Switch > Key Vault
Credentials
, or right-click a switch and select
Key Vault Credentials
.
The
Key Vault Credentials
dialog box displays.
FIGURE 15
Key Vault Credentials dialog box
4.
Enter the Brocade group user name and password.
Keep the following rules in mind when registering the Brocade user name and password:
-
The user name and password must match the user name and password specified for the
Brocade group.
-
The same user name and password must be configured on all nodes in an encryption
group. This is not enforced or validated by the encryption group members, so care must be
taken when configuring the user name and password to ensure they are the same on each
node.
-
Different user names and passwords can never be used within the same encryption group,
but each encryption group may have its own user name and password.
-
If you change the user name and password, the keys created by the previous user become
inaccessible. The Brocade group user name and password must also be changed to the
same values on SKM/ESKM to make the keys accessible.
-
When storage is moved from one encryption group to another, and the new encryption
group uses different user name and password, the Brocade group user name and
password must also be changed to the same values on SKM/ESKM to make the keys
accessible.
5.
Repeat the procedure for each node.