Chapter 8: Encryption Key Management
Using SKM
Quantum Scalar i6000 User’s Guide
317
recipient. Each key contained in the file is encrypted using the public key
of the destination SKM server. The destination SKM server provides its
public key to the source SKM server as part of an Encryption Key
Certificate, which the source SKM server uses to wrap (encrypt) the
encryption keys for transport. Upon arrival, the file containing the
wrapped encryption keys can only be unwrapped by the corresponding
private key, which resides on the destination SKM server and is never
shared.
The process is as follows:
1
The destination administrator exports the Encryption Key Certificate
that belongs to the destination SKM server. The Encryption
Certificate is saved as a file to a location specified by the
administrator on a computer (see
Exporting Encryption Certificates
2
The destination administrator e-mails the Encryption Key Certificate
file to the source administrator.
3
The source administrator saves the Encryption Key Certificate file to
a location on a computer, and then imports the Encryption Key
Certificate onto the source SKM server (see
4
The source administrator exports the Encryption Keys, assigning the
same Encryption Key Certificate noted above to wrap the keys. The
file containing the wrapped encryption keys is saved to a location
on a computer specified by the source administrator. See
5
The source administrator e-mails the file containing the wrapped
encryption keys to the destination administrator.
6
The destination administrator saves the file containing the wrapped
encryption keys to a location on a computer, and then imports the
keys onto the destination SKM server (see Importing Encryption
Keys).
7
The destination library can now read the encrypted tapes.
Importing Encryption Certificates
The encryption certificate contains a public key that is used to wrap
(encrypt) encryption keys prior to transporting them to another SKM
server. When sharing tape cartridges, or when performing a backup in
Summary of Contents for Scalar i6000
Page 1: ...User s Guide Scalar i6000 6 66879 15 Rev B...
Page 276: ...Chapter 3 Configuring Your Library Working with Towers 258 Quantum Scalar i6000 User s Guide...
Page 344: ...Chapter 8 Encryption Key Management Using SKM 326 Quantum Scalar i6000 User s Guide...
Page 444: ...Chapter 11 Configuring Access to StorNext 426 Quantum Scalar i6000 User s Guide...
Page 450: ...Chapter 12 Partition Utilization Reporting 432 Quantum Scalar i6000 User s Guide...
Page 574: ...Chapter 15 Maintaining Your Library Maintenance Actions 556 Quantum Scalar i6000 User s Guide...
Page 730: ...Appendix A Frequently Asked Questions 684 Quantum Scalar i6000 User s Guide...