Chapter 5. Disk Security with Full Disk Encryption drives
271
The window shown in Figure 5-12 opens and you are prompted to add a security identifier
(optional), a location to store the key file in, and a pass phrase.
Figure 5-12 Change Security Key options
The new security key is generated by the controller firmware and is hidden in the storage
subsystem. The new security key replaces the previous key that was used to unlock the
security-enabled FDE drives in the storage subsystem. The controller negotiates with all of
the security-enabled FDE drives for the new key.
The original security key is also stored in the storage subsystem for protection in case
something prevents the controllers from completing the negotiation of the new security key
with the security-enabled FDE drives (for example, loss of storage subsystem power during
the key change process). If this happens, you must change the security key so that only one
version of the security key is used to unlock all drives in a storage subsystem. The original
key is stored in the storage subsystem only. It cannot be changed directly or exported to a
security key backup file.
Summary of Contents for System Storage DS4000
Page 2: ......
Page 18: ...xvi IBM Midrange System Storage Hardware Guide...
Page 40: ...22 IBM Midrange System Storage Hardware Guide...
Page 302: ...284 IBM Midrange System Storage Hardware Guide...
Page 344: ...326 IBM Midrange System Storage Hardware Guide...
Page 372: ...354 IBM Midrange System Storage Hardware Guide Figure 7 25 Drive firmware Incompatible...
Page 490: ...472 IBM Midrange System Storage Hardware Guide...
Page 522: ...504 IBM Midrange System Storage Hardware Guide...
Page 544: ...526 IBM Midrange System Storage Hardware Guide...
Page 561: ...Index 543 Z zoning 129 130...
Page 562: ...544 IBM Midrange System Storage Hardware Guide...
Page 564: ...IBM Midrange System Storage Hardware Guide IBM Midrange System Storage Hardware Guide...
Page 565: ......