7.
For each alias, issue the
tklmKeyExport
command with the
-type
parameter
set to
privatekey
. This command creates a file for each key alias. The
following is an example of the command and output:
wsadmin>print AdminTask.tklmKeyExport (’[ -alias certa -fileName mysecretkeys1
-keyStoreName "Tivoli Key Lifecycle Manager Keystore" -type privatekey
-keyAlias certa]’)
8.
Transfer the files created in step 7 to the server where the second Tivoli Key
Lifecycle Manager instance is running.
9.
For the second Tivoli Key Lifecycle Manager instance, ensure that the
ds8k.acceptUnknownDrives
parameter is set to
true
in the Tivoli Key Lifecycle
Manager configuration file to allow requests from unknown DS8000 storage
images.
10.
For the second Tivoli Key Lifecycle Manager instance, issue the
tklmKeyImport
command for each of these files. The password that you must specify is the
password that was used for the keystore of the Tivoli Key Lifecycle Manager
server for which the files were created.
11.
Optionally, add the DS8000 devices listed in step 1 on page 85 to the second
Tivoli Key Lifecycle Manager instance using the
tklmDeviceAdd
command.
DS8000 encryption considerations
This section discusses the considerations for DS8000 encryption.
The following information might be helpful in using data encryption on DS8000:
v
DS8000 ships from the factory with encryption disabled on each SFI. You must
follow the procedures described to have IBM activate encryption on each DS8000
SFI.
v
An encryption-capable DS8000 can be configured to either enable or disable
encryption. Ensure that the needed configuration is achieved before storing data
on any configured storage.
v
The DS8000 Storage Manager and command-line interface must be upgraded to
the appropriate level to enable encryption on an encryption capable DS8000. If
you use an earlier version of DS8000 Storage Manager and command-line
interface, the DS8000 is configured with encryption disabled.
v
CIM support for DS8000 encrypting storage at this time does not support the
configuration of Tivoli Key Lifecycle Manager IP ports, encryption groups,
encrypting ranks, or encrypting extent pools. A system that is configured with
encrypting extent pools can use the CIM agent to configure encrypting logical
volumes and host attachments for encrypting logical volumes.
v
Tivoli Key Lifecycle Manager has a policy input for setting the length of time
that key label remains valid. For example, the validity period for a new
certificate. This input controls the time that a key label supports requests for a
new data key. It does not prevent any existing data keys created for that key
label from being unwrapped. This input is set for each key label as it is created.
Because disks typically obtain a new key after an encryption group is
configured, the expiration of the certificate is not significant to the going
operation of currently installed and configured encryption groups. It affects
whether a new encryption group can be configured with that key label. The
default validity period is 20 years.
v
When using the RACF
®
on z/OS 1.9, the RACF keystore does not support
2048-bit data keys. Tivoli Key Lifecycle Manager generates 1024 bit wrapping
keys when running on this operating system. Tivoli Key Lifecycle Manager key
servers that run on other operating systems can import 1024 bit wrapping keys
86
Introduction and Planning Guide
Summary of Contents for DS8700
Page 2: ......
Page 8: ...vi Introduction and Planning Guide...
Page 10: ...viii Introduction and Planning Guide...
Page 20: ...xviii Introduction and Planning Guide...
Page 22: ...xx Introduction and Planning Guide...
Page 44: ...22 Introduction and Planning Guide...
Page 142: ...120 Introduction and Planning Guide...
Page 160: ...138 Introduction and Planning Guide...
Page 212: ...190 Introduction and Planning Guide...
Page 218: ...196 Introduction and Planning Guide...
Page 224: ...202 Introduction and Planning Guide...
Page 242: ...220 Introduction and Planning Guide...
Page 254: ...232 Introduction and Planning Guide...
Page 255: ......
Page 256: ...Printed in USA GC27 2297 09...