Enabling onboard key management in ONTAP 9.6 and later
You can use the Onboard Key Manager to secure the keys that the cluster uses to access encrypted data. You must enable Onboard Key Manager on each cluster that accesses an encrypted volume or a self-encrypting disk.
Before you begin
If you are using LSE with an external key management (KMIP) server, you must have deleted the external key manager database.
Transitioning to onboard key management from external key management
You must be a cluster administrator to perform this task.
- You must configure the MetroCluster environment before you enable encryption.
About this task
You must run the security key-manager onboard enable command each time you add a node to the cluster. In MetroCluster configurations, you must run security key-manager onboard enable on the local cluster first, then run security key-manager onboard sync on the remote cluster, using the same passphrase on each.
By default, you are not required to enter the key manager passphrase when a node is rebooted. Except in MetroCluster, you can use the cc-mode-enabled=yes option to require that users enter the passphrase after a reboot.
After you finish
Copy the passphrase to a secure location outside the storage system for future use.
All key management information is automatically backed up to the replicated database (RDB) for the cluster. You should also back up the information manually for use in case of a disaster.