parameters and a copy of the configuration along with recovery instructions.
Should a server be replaced, you must reload the TKLM code and restore the
TKLM configuration.
Before installing the TKLM server, you must configure the host name of the server
in which TKLM is being installed. Ensure that you note and keep the host name of
the server because the host name cannot be changed after configuration. (The DB2
®
database that is used by the TKLM server will not function without correct host
names.) Not accessing correct host names can potentially result in temporary loss
of access to the storage device that is being managed by the TKLM server.
If you are installing the TKLM server from the DVD that is included with your
product, you can store the contents of the DVD in a temporary directory by using
the following steps:
1.
Right-click the DVD content diagram that displays after you insert the DVD
into the media drive.
2.
Select the
Extract to
option and navigate to the temporary directory where
you want to store the DVD contents.
Note:
For information on installation procedures (including post installation steps)
for the TKLM, see the
IBM Tivoli Key Lifecycle Manager/Installation and
Configuration Guide
that is included in the http://publib.boulder.ibm.com/
infocenter/tivihelp/v4r1/index.jsp.
After the installation of the application is complete, ensure that you set the
TKLM application to
auto start
in case of a power outage at your facility.
By doing so, you can significantly reduce the time it takes to recover from
data loss caused by a power outage.
IBM Security Key Lifecycle Manager for z/OS
IBM Security Key Lifecycle Manager for z/OS generates encryption keys and
manages their transfer to and from devices in a System z environment.
IBM Security Key Lifecycle Manager for z/OS is supported on the DS8000. Some
of the benefits include, but are not limited to:
v
Helps reduce the cost of lost data
v
Enhances data security while dramatically reducing the number of encryption
keys to be managed
v
Centralizes and automates the encryption key management process
v
Integrates with IBM self-encrypting storage devices to provide creation and
protection of keys to storage devices
For more information, see the http://publib.boulder.ibm.com/infocenter/tivihelp/
v2r1/index.jsp?topic=/com.ibm.tivoli.isklm.doc_11/ic-homepage.html.
DS8000 disk encryption
The DS8000 supports data encryption with the IBM Full Disk Encryption drives.
The IBM Full Disk Encryption feature is available on the DS8700and DS8800.
Recovery key and dual key server platform support is available on the DS8700 and
DS8800.
74
Introduction and Planning Guide
Summary of Contents for DS8700
Page 2: ......
Page 8: ...vi Introduction and Planning Guide...
Page 10: ...viii Introduction and Planning Guide...
Page 20: ...xviii Introduction and Planning Guide...
Page 22: ...xx Introduction and Planning Guide...
Page 44: ...22 Introduction and Planning Guide...
Page 142: ...120 Introduction and Planning Guide...
Page 160: ...138 Introduction and Planning Guide...
Page 212: ...190 Introduction and Planning Guide...
Page 218: ...196 Introduction and Planning Guide...
Page 224: ...202 Introduction and Planning Guide...
Page 242: ...220 Introduction and Planning Guide...
Page 254: ...232 Introduction and Planning Guide...
Page 255: ......
Page 256: ...Printed in USA GC27 2297 09...