Create external security key
To use the Drive Security feature with a key management server, you must create an external key that is shared by the key management server and the secure-capable drives in the storage array.
Before you begin
Secure-capable drives must be installed in the array. These drives can be Full Disk Encryption (FDE) drives or Federal Information Processing Standard (FIPS) drives.
NoteIf both FDE and FIPS drives are installed in the storage array, they all share the same security key.The Drive Security feature must be enabled. Otherwise, a Cannot Create Security Key dialog box opens during this task. If necessary, contact your storage vendor for instructions on enabling the Drive Security feature.
- You have a signed client certificate file for the storage array's controllers, and you have copied that file to the host where you are accessing System Manager. A client certificate validates the storage array's controllers, so the key management server can trust their Key Management Interoperability Protocol (KMIP) requests.
- You must retrieve a certificate file from the key management server, and then copy that file to the host where you are accessing System Manager. A key management server certificate validates the key management server, so the storage array can trust its IP address. You can use a root, intermediate, or server certificate for the key management server.NoteFor more information about the server certificate, consult the documentation for your key management server.
About this task
In this task, you define the IP address of the key management server and the port number it uses, and then load certificates for external key management.What happens next?
When external key management is enabled, you can create secure-enabled volume groups or pools, or you can enable security on existing volume groups and pools.Note
Whenever power to the drives is turned off and then on again, all the secure-enabled drives change to a Security Locked state. In this state, the data is inaccessible until the controller applies the correct security key during drive initialization. If someone physically removes a locked drive and installs it in another system, the Security Locked state prevents unauthorized access to its data.
After you finish
You should validate the security key to make sure the key file is not corrupted.
Give documentation feedback