Scalar I500 User's Guide - Quantum scalar i500 User Manual

Hide thumbs Also See for scalar i500:
Table of Contents

Advertisement

Scalar i500 User's Guide

Generating Data Encryption Keys
Data encryption keys are generated in sets of a specified quantity (see the
Scalar Key Manager User's Guide for more information).
The library tracks data encryption key usage and reminds you to generate
more keys when needed. If you try to generate data encryption keys on
an SKM server that already has sufficient unused data encryption keys,
then it will not create more. You will receive a message to that effect on
the library remote Web client.
Each library that you connect to an SKM server requires its
Note:
own set of data encryption keys. Each library only pulls data
encryption keys from the set that "belongs" to it. This means
that an SKM server may contain several distinct sets of data
encryption keys. When the data encryption keys for one
library have all been used, then more keys must be
generated.
You can generate data encryption keys in the following ways:
Generating Data Encryption Keys at Initial Setup
Generating Data Encryption Keys When 80% Depleted
Generating Data Encryption Keys When 100% Depleted
Manually Generating Data Encryption Keys
Generating Data Encryption Keys at Initial Setup
At initial setup, the library triggers each SKM server to generate a set of
data encryption keys. The process is described in
Partitions for Library Managed Encryption
Generating Data Encryption Keys When 80% Depleted
SKM server has used 80 percent of the data encryption keys assigned to a
Chapter 7 Encryption Key Management
Configuring Encryption Key Management on the Library
Step 6: Configuring
on page 184.
When an
7
7
7
193

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents