Quantum Scalar i6000 Quick Start Manual Download Page 17

Q

UANTUM

 S

CALAR

 

I

6000 & S

AFE

N

ET

 K

EY

S

ECURE

 Q

UICK

 S

TART

 G

UIDE

20

The available fields are:

-

Password

 

Authentication

 - determines whether you require users to provide a username and 

password to access the key server when using KMIP. There are two options:

Optional

 - (default) no password authentication is required; global sessions are allowed; 

unauthenticated users can create global keys; all users can access global keys; only authenticated 
users can create and access non-global keys. 

Required

 - password authentication is required; global sessions are not allowed; only non-global 

keys can be created; authenticated users can access global and non-global keys. 

-

Client

 

Certificate

 

Authentication

 - You must enable this feature to comply with the KMIP standard. 

there are two options.

Used for SSL session only

 - clients must provide a certificate signed by a CA trusted by the 

KeySecure in order to establish an SSL connection. When you select this option, you must also 
select a Trusted CA List Profile.

Used for SSL session and username

 - clients must provide a certificate signed by a CA trusted by 

the KeySecure in order to establish an SSL connection; additionally, a username is derived from 
the client certificate. That username is the sole means of authentication if password authentication 
is optional and the client does not provide a username and password. If the client does provide a 
username, the key server compares the username derived from the certificate against the 
username in the authentication request. If the usernames match and the password is valid, the 
user is authenticated. If the usernames are not the same, the connection is closed immediately. 
When you select this option, you must also select a Trusted CA List Profile, and you must choose 
the field from which the username is derived. 

-

Trusted

 

CA

 

List

 

Profile

 - select a profile to use to verify that client certificates are signed by a CA 

trusted by the KeySecure. This field is only used if you select 

Used for SSL session only

 or 

Used for 

SSL session and username

 above. As delivered, the default Trusted CA List profile contains no CAs. 

You must either add CAs to the default profile or create a new profile and populate is with at least 
one trusted CA before the key server can authenticate client certificates. 

-

Username

 

Field

 

in

 

Client

 

Certificate

 - specify the field from which to derive the username. This 

field is only used if you select 

Used for SSL session and username

 above. The username can come 

from the 

UID

 (user ID), 

CN

 (Common Name), 

SN

 (Surname), 

E

 (Email address), 

E_ND

 (Email 

without domain), or 

OU

 (Organizational Unit) field.

If you select 

E_ND

, the key server matches against the data to the left of the @ symbol in the email 

address in the certificate request. For example, if the certificate request contains the email address 
[email protected], then the key server matches against User1.

-

Require

 

Client

 

Certificate

 

to

 

Contain

 

Source

 

IP

 - determines if the key server expects that the 

client certificate presented by the client application has an IP address in the subjectAltName field. 
The key server obtains the IP address from the subjectAltName and compares that the source IP 
address of the client application; if the two IP addresses match, the key server authenticates the 
user. If the two IP addresses do not match, the key server closes the connection with the client. 

The KeySecure is now ready to manage keys and can handle requests that come through the KMIP 
Interface.

Summary of Contents for Scalar i6000

Page 1: ...ne at a time as needed upon request This document summarizes the information available in the quick start and user guides that accompany your Quantum Scalar i6000 library and SafeNet KeySecure applian...

Page 2: ...5 Use a screwdriver to tighten the screws This should securely attach the mounting brackets to the rack posts 6 Connect the null modem cable to the serial port on the back panel of the KeySecure Plug...

Page 3: ...nly be reset by another administrator with the appropriate access privileges This is a fundamental security precaution If all administrator passwords are lost you cannot re configure the KeySecure All...

Page 4: ...ation tool to run from The default value is recommended Enter the port number 9443 Enter the port number The script displays the default port of 9443 You can accept this default by pressing Enter or y...

Page 5: ...rm the same PIN value SETTING SO PIN Are you duplicating this keyset Y N g Press No The KeySecure CLI displays the following message Luna PED operation required to login as HSM Administrator use Secur...

Page 6: ...Press ENTER m Insert the Domain red iKey and press Enter SETTING DOMAIN Enter new PED PIN n Enter a PIN value SETTING DOMAIN Confirm new PED PIN o Confirm the same PIN value SETTING DOMAIN Are you dup...

Page 7: ...icating this keyset Y N w Press No USER LOGIN Insert a USER Partition Owner PED Key Press ENTER x Keep the User Partition black iKey inserted in the PED and press Enter USER LOGIN Enter PED PIN y Ente...

Page 8: ...y Press ENTER ae Insert the User Partition black iKey and press Enter USER LOGIN Enter PED PIN af Enter the PIN for the User Partition Owner black iKey and press Enter The KeySecure CLI displays the f...

Page 9: ...Web administration server Creating certificate for signing logs Creating SSH host keys SSH RSA key fingerprint 2048 41 63 d3 ca c9 ea 1f f7 a1 84 8b 05 b4 a6 3b 64 SSH DSA key fingerprint 2048 1d 04 d...

Page 10: ...6000 the CA s Key Size must be 2048 4 Select either Self signed Root CA or Intermediate CA Request as the Certificate Authority Type When you create a self signed root CA you must also specify a CA Ce...

Page 11: ...CA Configuration page Security SSL Certificates 2 Enter the Certificate Name Common Name Organization Name Organizational Unit Name Locality Name State or Province Name Country Name Email Address and...

Page 12: ...XhLVapKMqNuUHUYf7CTB5JNHHy0cYKTNHHy0cYKTuV1Ce8nvvU G yp2Eh8aJ7thaua41xDFXPmIEXTqzXi1 DCWAdWaysojPCZugY7jNWXmg END CERTIFICATE REQUEST Important Be sure to include the first and last lines BEGIN CERTIF...

Page 13: ...e key the certificate request can t be created on the KeySecure Below are the instructions for creating the certificate request in OpenSSL though you may use another certificate creation tool if desir...

Page 14: ...icate request A challenge password asdf1234 An optional company name 3 Open the certificate request in a text editor Copy the text 4 Copy the certificate request text The certificate text looks simila...

Page 15: ...mat using the following openssl command openssl pkcs12 export in signed crt inkey qtmkey pem out qtmbundle p12 Enter pass phrase for qtmkey pem Enter Export Password Verifying Enter Export Password Th...

Page 16: ...e key server is listening for client requests We recommend 5696 for KMIP Use SSL required for KMIP Server Certificate must point to a server certificate signed by a local CA Connection Timeout sec spe...

Page 17: ...connection is closed immediately When you select this option you must also select a Trusted CA List Profile and you must choose the field from which the username is derived Trusted CA List Profile sel...

Page 18: ...ion and Quantity Quantity refers to the number drives licensed to use this feature 3 In the Enter License Key box type the appropriate license key License keys are not case sensitive and are all inclu...

Page 19: ...le above Client Certificate qtmbundle p12 from the example above These files must be in the proper format as follows If any of the following requirements is not met neither of the certificates will be...

Page 20: ...lick Browse to retrieve the Client Certificate File 6 In the Client Certificate Password field type the password used when generating the certificate files your server administrator should provide thi...

Page 21: ...is configured Note Assign your SafeNet KeySecures on this screen in the order in which you want failover to occur Server 1 is the primary server Server 2 is the secondary server and so on For an initi...

Page 22: ...leshoot until they all pass For more information on EKM Path Diagnostics see Scalar i6000 User s Guide 5 Click Close 6 Click OK An Operation in Progress dialog box appears indicating the settings are...

Page 23: ...ver be appended to encrypted data on tape For data to be encrypted via library managed encryption the media must be blank or have been written to using library managed encryption at the first write op...

Page 24: ...re Using EKM Path Diagnostics EKM Path Diagnostics is a series of short tests performed by the library to determine if the EKM servers are connected and operating properly You can perform EKM Path Dia...

Reviews: