Generating Data Encryption Keys - Quantum scalar i40 User Manual

Hide thumbs Also See for scalar i40:
Table of Contents

Advertisement

Generating Data
Encryption Keys
Quantum Scalar i40 and Scalar i80 User's Guide
Performing Scalar Key Manager Functions Available on the Library
Caution: Every time you generate new data encryption keys, you
must back up both SKM servers before you begin using the
keys to encrypt data. Refer to the
User's Guide
Data encryption keys are generated in sets of a specified quantity (see
Scalar Key Manager User's Guide
the
The library tracks data encryption key usage and reminds you to
generate more keys when needed. If you try to generate data encryption
keys on an SKM server that already has sufficient unused data
encryption keys, then it will not create more. You will receive a message
to that effect on the library remote Web client.
Note: Each library that you connect to an SKM server requires its own
set of data encryption keys. Each library only pulls data
encryption keys from the set that "belongs" to it. This means
that an SKM server may contain several distinct sets of data
encryption keys. When the data encryption keys for one library
have all been used, then more keys must be generated.
You can generate data encryption keys in the following ways:
Generating Data Encryption Keys at Initial Setup
Generating Data Encryption Keys When 80% Depleted
Generating Data Encryption Keys When 100% Depleted
Manually Generating Data Encryption Keys
Generating Data Encryption Keys at Initial Setup
At initial setup, the library triggers each SKM server to generate a set of
data encryption keys. The process is described in
Partitions for Library Managed Encryption
Generating Data Encryption Keys When 80% Depleted
When an SKM server has used 80 percent of the data encryption keys
assigned to a particular library, that library attempts to automatically
generate data encryption keys on the SKM server. Both SKM servers
must be running and operational in order for automatic key generation
to succeed.
Chapter 7: Encryption Key Management
for instructions.
for more information).
on page 183.
Scalar Key Manager
Step 7: Configure
199

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Scalar i80

Table of Contents