![NetApp HCI Скачать руководство пользователя страница 25](http://html1.mh-extra.com/html/netapp/hci/hci_manual_1669957025.webp)
External key management
You can configure Element software to use a third-party KMIP-compliant key management service (KMS) to
manage storage cluster encryption keys. When you enable this feature, the storage cluster’s cluster-wide drive
access password encryption key is managed by a KMS that you specify.
Element can use the following key management services:
• Gemalto SafeNet KeySecure
• SafeNet AT KeySecure
• HyTrust KeyControl
• Vormetric Data Security Manager
• IBM Security Key Lifecycle Manager
For more information on configuring External Key Management, see
Getting started with External Key
in the SolidFire and Element Documentation Center.
Multi-factor authentication
Multi-factor authentication (MFA) enables you to require users to present multiple types of evidence to
authenticate with the NetApp Element web UI or storage node UI upon login. You can configure Element to
accept only multi-factor authentication for logins integrating with your existing user management system and
identity provider.
You can configure Element to integrate with an existing SAML 2.0 identity provider which can enforce multiple
authentication schemes, such as password and text message, password and email message, or other
methods.
You can pair multi-factor authentication with common SAML 2.0 compatible identity providers (IdPs), such as
Microsoft Active Directory Federation Services (ADFS) and Shibboleth.
To configure MFA, see
Enabling multi-factor authentication
in the SolidFire and Element Documentation
Center.
FIPS 140-2 for HTTPS and data at rest encryption
NetApp SolidFire storage clusters and NetApp HCI systems support encryption that complies with the Federal
Information Processing Standard (FIPS) 140-2 requirements for cryptographic modules. You can enable FIPS
140-2 compliance on your NetApp HCI or SolidFire cluster for both HTTPS communications and drive
encryption.
When you enable FIPS 140-2 operating mode on your cluster, the cluster activates the NetApp Cryptographic
Security Module (NCSM) and leverages FIPS 140-2 Level 1 certified encryption for all communication via
HTTPS to the NetApp Element UI and API. You use the
EnableFeature
Element API with the
fips
parameter to enable FIPS 140-2 HTTPS encryption. On storage clusters with FIPS-compatible hardware, you
can also enable FIPS drive encryption for data at rest using the
EnableFeature
Element API with the
FipsDrives
parameter.
For more information about preparing a new storage cluster for FIPS 140-2 encryption, see
For more information about enabling FIPS 140-2 on an existing, prepared cluster, see
Содержание HCI
Страница 95: ...NetApp HCI Resources page...
Страница 275: ...A popup window shows a message about getting started with Rancher 2 Click Deploy Rancher The Rancher UI appears...
Страница 308: ......