Smart Card Usage; Registering Authentication Cards From A Card Reader - Brocade Communications Systems Brocade 8/12c Administrator's Manual

Supporting hp secure key manager (skm) environments and hp enterprise secure key manager (eskm) environments
Hide thumbs Also See for Brocade 8/12c:
Table of Contents

Advertisement

2

Smart card usage

Smart card usage

Smart cards are credit card-sized cards that contain a CPU and persistent memory. Smart cards
can be used as security devices. You must have Storage Encryption Security user privileges to
activate, register, and configure smart cards.
Smart cards can be used to do the following:
Smart card readers provide a plug-and-play interface to read and write to a smart card. The
following smart card readers are supported:
NOTE
Only the Brocade smart cards that are included with the BES/FS8-18 are supported.
See the following procedures for instructions about how to manage smart cards:

Registering authentication cards from a card reader

When authentication cards are used, one or more authentication cards must be read by a card
reader attached to a Management application PC to enable certain security-sensitive operations.
These include the following:
To register an authentication card or a set of authentication cards from a card reader, you must
have the cards physically available. Authentication cards can be registered during encryption group
or member configuration when running the configuration wizard, or they can be registered using
the following procedure.
16
Control user access to the Management application security administrator roles.
Control activation of encryption engines.
Securely store backup copies of master keys.
GemPlus GemPC USB
http://www.gemalto.com/readers/index.html
SCM MicrosystemsSCR331
http://www.scmmicro.com/security/view_product_en.php?PID=2
"Registering authentication cards from a card reader"
"Registering system cards from a card reader"
"Tracking smart cards"
on page 22
"Saving a master key to a smart card set"
"Restoring a master key from a smart card set"
Master key generation, backup, and restore operations.
Replacement of authentication card certificates.
Enabling and disabling the use of system cards.
Changing the quorum size for authentication cards.
Establishing a trusted link with the NetApp LKM key manager.
Decommissioning LUNs.
on page 16
on page 21
on page 82
on page 86
Fabric OS Encryption Administrator's Guide
53-1002159-03

Advertisement

Table of Contents
loading

This manual is also suitable for:

Fabric os encryption

Table of Contents