HP Brocade 8/12c Fabric OS Encryption Administrator's Guide - Page 51

Enabling SSL on the Key Management System (KMS) Server, Sign with Certificate Authority

Page 51 highlights

Steps for connecting to an SKM or ESKM appliance 2 10. Click Sign Request. 11. Enter the required data in the Sign Certificate Request section of the window. Select the CA name from the Sign with Certificate Authority drop-down list. 12. Paste the copied certificate request data into the Certificate Request box. 13. Click Sign Request. The signed certificate request data displays under Sign Certificate Request. 14. Click Download to download the signed certificate to your local system. 15. Copy the signed certificate data, from -----BEGIN to END...----- lines. Be careful to exclude extra carriage returns or spaces after the data. 16. From the Security tab, select Certificates under Certificates & CAs. 17. Select the server certificate name you just created from the certificate list, and select Properties. The Certificate Request Information window displays. 18. Click Install Certificate. The Certificate Installation window displays. 19. Paste the signed certificate data you copied under Certificate Response and click Save. The status of the server certificate should change from Request Pending to Active. Enabling SSL on the Key Management System (KMS) Server The KMS Server provides the interface to the client. Secure Sockets Layer (SSL) must be enabled on the KMS Server before this interface will operate. After SSL is enabled on the first appliance, it will be automatically enabled on the other cluster members. To configure and enable SSL, complete the following steps: 1. Select the Device tab. 2. In the Device Configuration menu, click KMS Server to display the Key Management Services Configuration window. Fabric OS Encryption Administrator's Guide 31 53-1002159-03

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282

Fabric OS Encryption Administrator’s Guide
31
53-1002159-03
Steps for connecting to an SKM or ESKM appliance
2
10. Click
Sign Request
.
11.
Enter the required data in the
Sign Certificate Request
section of the window. Select the CA
name from the
Sign with Certificate Authority
drop-down list.
12.
Paste the copied certificate request data into the
Certificate Request
box.
13. Click
Sign Request
.
The signed certificate request data displays under
Sign Certificate Request
.
14. Click
Download
to download the signed certificate to your local system.
15.
Copy the signed certificate data, from -----BEGIN to END…----- lines. Be careful to exclude extra
carriage returns or spaces after the data.
16.
From the
Security
tab, select
Certificates
under
Certificates & CAs
.
17.
Select the server certificate name you just created from the certificate list, and select
Properties
.
The
Certificate Request Information
window displays.
18. Click
Install Certificate
.
The
Certificate Installation
window displays.
19.
Paste the signed certificate data you copied under
Certificate Response
and click
Save
.
The status of the server certificate should change from
Request Pending
to
Active
.
Enabling SSL on the Key Management System (KMS) Server
The KMS Server provides the interface to the client. Secure Sockets Layer (SSL) must be enabled
on the KMS Server before this interface will operate. After SSL is enabled on the first appliance, it
will be automatically enabled on the other cluster members.
To configure and enable SSL, complete the following steps:
1.
Select the
Device
tab.
2.
In the
Device Configuration
menu, click
KMS Server
to display the
Key Management Services
Configuration
window.