Skip to main content

Enabling onboard key management in ONTAP 9.6 and later

You can use the Onboard Key Manager to secure the keys that the cluster uses to access encrypted data. You must enable Onboard Key Manager on each cluster that accesses an encrypted volume or a self-encrypting disk.

Before you begin

About this task

You must run the security key-manager onboard enable command each time you add a node to the cluster. In MetroCluster configurations, you must run security key-manager onboard enable on the local cluster first, then run security key-manager onboard sync on the remote cluster, using the same passphrase on each.

By default, you are not required to enter the key manager passphrase when a node is rebooted. Except in MetroCluster, you can use the cc-mode-enabled=yes option to require that users enter the passphrase after a reboot.

Note
After a failed passphrase attempt, you must reboot the node again.
  1. Start the key manager setup wizard: security key-manager onboard enable -cc-mode-enabled yes|no
    Note
    Set cc-mode-enabled=yes to require that users enter the key manager passphrase after a reboot. The - cc-mode-enabled option is not supported in MetroCluster configurations.

    The security key-manager onboard enable command replaces the security key-manager setup command.

    Example

    The following example starts the key manager setup wizard on cluster1 without requiring that the passphrase be entered after every reboot:

    cluster1::> security key-manager onboard enable

    Enter the cluster-wide passphrase for onboard key management in Vserver "cluster1":: <32..256 ASCII characters long text>
    Reenter the cluster-wide passphrase: <32..256 ASCII characters long text>

  2. At the passphrase prompt, enter a passphrase between 32 and 256 characters, or for cc-mode, a passphrase between 64 and 256 characters.
    Note
    If the specified cc-mode passphrase is less than 64 characters, there is a five-second delay before the key manager setup wizard displays the passphrase prompt again.
  3. At the passphrase confirmation prompt, reenter the passphrase.
  4. Verify that the authentication keys have been created: security key-manager key query -node node
    Note
    The security key-manager key query command replaces the security key-manager query key command. For complete command syntax, see the man page.

    Example

    The following example verifies that authentication keys have been created for cluster1 :

    cluster1::> security key-manager key query
    Vserver: cluster1
    Key Manager: onboard
    Node: node1

    Key Tag Key Type Restored
    ------------------------------------ -------- --------
    node1 NSE-AK yes
    Key ID: 000000000000000002000000000001000c11b3863f78c2273343d7ec5a67762e0000000000000000
    node1 NSE-AK yes
    Key ID: 000000000000000002000000000001006f4e2513353a674305872a4c9f3bf7970000000000000000

    Vserver: cluster1
    Key Manager: onboard
    Node: node2

    Key Tag Key Type Restored
    ------------------------------------ -------- --------
    node1 NSE-AK yes
    Key ID: 000000000000000002000000000001000c11b3863f78c2273343d7ec5a67762e0000000000000000
    node2 NSE-AK yes
    Key ID: 000000000000000002000000000001006f4e2513353a674305872a4c9f3bf7970000000000000000

After you finish

Copy the passphrase to a secure location outside the storage system for future use.

All key management information is automatically backed up to the replicated database (RDB) for the cluster. You should also back up the information manually for use in case of a disaster.