Master Key Actions; Reasons Master Keys Can Be Disabled; Saving The Master Key To A File - Brocade Communications Systems Brocade 8/12c Administrator's Manual

Supporting hp secure key manager (skm) environments and hp enterprise secure key manager (eskm) environments
Hide thumbs Also See for Brocade 8/12c:
Table of Contents

Advertisement

Master key actions

Master key actions are as follows:

Reasons master keys can be disabled

Master key actions are disabled if unavailable. There are several ways a master key can be
disabled:

Saving the master key to a file

Use the following procedure to save the master key to a file.
1. Select Configure > Encryption from the menu task bar.
2. Select a group from the Encryption Center Devices table, then select Group > Security from the
3. Select Backup Master Key as the Master Key Action.
Fabric OS Encryption Administrator's Guide
53-1002159-03
Backup master key, which is enabled any time a master key exists.
You can back up the master key to a file, to a key vault, or to a smart card. You can back up the
master key multiple times to any of these media in case you forget the passphrase you
originally used to back up the master key, or if multiple administrators each needs a
passphrase for recovery.
Restore master key, which is enabled when no master key exists or the previous master key
has been backed up.
Create new master key, which is enabled when no master key exists or the previous master key
has been backed up.
The user does not have Storage Encryption Security permissions. See
privileges"
on page 15 for more information.
The group leader is not discovered or managed by the Management application.
The Encryption Center dialog box displays.
menu task bar, or right-click a group and select Security.
The Encryption Group Properties dialog box displays with the Security tab selected.
The Master Key Backup dialog box displays, but only if the master key has already been
generated.
2
Master keys
"Encryption user
79

Advertisement

Table of Contents
loading

This manual is also suitable for:

Fabric os encryption

Table of Contents