
696
Brocade Network Advisor SAN User Manual
53-1003154-01
Smart card usage
20
Smart card usage
Smart cards are credit card-sized cards that contain a CPU and persistent memory. Smart cards
can be used as security devices. You must have
Storage Encryption Security
user privileges to
activate, register, and configure smart cards.
Smart cards can be used to do the following:
•
Control user access to the Management application security administrator roles
•
Control activation of encryption engines
•
Securely store backup copies of master keys
Smart card readers provide a plug-and-play interface that allows you to read and write to a smart
card. The following smart card readers are supported:
•
GemPlus GemPC USB
http://www.gemalto.com/readers/index.html
•
Indentive
http://www.indentive-infrastructure.com
NOTE
Only the Brocade smart cards that are included with the encryption switches are supported.
Using authentication cards with a card reader
When authentication cards are used, one or more authentication cards must be read by a card
reader attached to a Management application workstation to enable certain security-sensitive
operations. These include the following:
•
Performing master key generation, backup, and restore operations.
•
Registering or deregistering and replacement of authentication cards.
•
Enabling and disabling the use of system cards.
•
Changing the quorum size for authentication cards.
Storage Encryption
Security
•
Launch the Encryption center dialog box.
•
View switch, group, or engine properties.
•
View Encryption Group Properties Security tab.
•
View LUN centric view.
•
View all rekey sessions.
•
View encryption targets, hosts, and LUNs.
•
Create a master key.
•
Backup a master key.
•
Edit smart card.
•
View and modify settings on the Encryption Group Properties Security tab (quorum size,
authentication cards list and system card requirement).
•
Establish link keys for LKM/SSKM key managers.
•
Show tape LUN statistics.
TABLE 66
Encryption privileges (Continued)
Privilege
Read/Write
Summary of Contents for Network Advisor 12.3.0
Page 4: ...iv Brocade Network Advisor SAN User Manual 53 1003154 01...
Page 86: ...34 Brocade Network Advisor SAN User Manual 53 1003154 01 Uninstalling a patch 2...
Page 190: ...138 Brocade Network Advisor SAN User Manual 53 1003154 01 Fabric tracking 4...
Page 216: ...164 Brocade Network Advisor SAN User Manual 53 1003154 01 User profiles 5...
Page 612: ...560 Brocade Network Advisor SAN User Manual 53 1003154 01 Exporting Host port mapping 13...
Page 620: ...568 Brocade Network Advisor SAN User Manual 53 1003154 01 Exporting storage port mapping 14...
Page 720: ...668 Brocade Network Advisor SAN User Manual 53 1003154 01 Security configuration deployment 17...
Page 744: ...692 Brocade Network Advisor SAN User Manual 53 1003154 01 Configuring Virtual Fabrics 19...
Page 1068: ...1016 Brocade Network Advisor SAN User Manual 53 1003154 01 Removing thresholds 24...
Page 1098: ...1046 Brocade Network Advisor SAN User Manual 53 1003154 01 Swapping blades 25...
Page 1176: ...1124 Brocade Network Advisor SAN User Manual 53 1003154 01 SAN connection utilization 28...
Page 1378: ...1326 Brocade Network Advisor SAN User Manual 53 1003154 01 Event logs 32...
Page 1448: ...1396 Brocade Network Advisor SAN User Manual 53 1003154 01 Upload failure data capture 34...
Page 1490: ...1438 Brocade Network Advisor SAN User Manual 53 1003154 01 SAN shortcut menus A...
Page 1494: ...1442 Brocade Network Advisor SAN User Manual 53 1003154 01 Call Home Event Tables B...
Page 1524: ...1472 Brocade Network Advisor SAN User Manual 53 1003154 01 About Roles and Access Levels D...
Page 1552: ...1500 Brocade Network Advisor SAN User Manual 53 1003154 01 Regular Expressions F...
Page 1920: ...1868 Brocade Network Advisor SAN User Manual 53 1003154 01 Views H...