Chapter 8: Encryption Key Management
Using SKM
Quantum Scalar i6000 User’s Guide
317
recipient. Each key contained in the file is encrypted using the public key
of the destination SKM server. The destination SKM server provides its
public key to the source SKM server as part of an Encryption Key
Certificate, which the source SKM server uses to wrap (encrypt) the
encryption keys for transport. Upon arrival, the file containing the
wrapped encryption keys can only be unwrapped by the corresponding
private key, which resides on the destination SKM server and is never
shared.
The process is as follows:
1
The destination administrator exports the Encryption Key Certificate
that belongs to the destination SKM server. The Encryption
Certificate is saved as a file to a location specified by the
administrator on a computer (see
Exporting Encryption Certificates
2
The destination administrator e-mails the Encryption Key Certificate
file to the source administrator.
3
The source administrator saves the Encryption Key Certificate file to
a location on a computer, and then imports the Encryption Key
Certificate onto the source SKM server (see
4
The source administrator exports the Encryption Keys, assigning the
same Encryption Key Certificate noted above to wrap the keys. The
file containing the wrapped encryption keys is saved to a location
on a computer specified by the source administrator. See
5
The source administrator e-mails the file containing the wrapped
encryption keys to the destination administrator.
6
The destination administrator saves the file containing the wrapped
encryption keys to a location on a computer, and then imports the
keys onto the destination SKM server (see Importing Encryption
Keys).
7
The destination library can now read the encrypted tapes.
Importing Encryption Certificates
The encryption certificate contains a public key that is used to wrap
(encrypt) encryption keys prior to transporting them to another SKM
server. When sharing tape cartridges, or when performing a backup in
Содержание Scalar i6000
Страница 1: ...User s Guide Scalar i6000 6 66879 15 Rev B...
Страница 140: ...Chapter 2 Troubleshooting Your Library Accessing Online Help 122 Quantum Scalar i6000 User s Guide...
Страница 276: ...Chapter 3 Configuring Your Library Working with Towers 258 Quantum Scalar i6000 User s Guide...
Страница 290: ...Chapter 5 Advanced Reporting Viewing Cross Partition Media Moves 272 Quantum Scalar i6000 User s Guide...
Страница 344: ...Chapter 8 Encryption Key Management Using SKM 326 Quantum Scalar i6000 User s Guide...
Страница 444: ...Chapter 11 Configuring Access to StorNext 426 Quantum Scalar i6000 User s Guide...
Страница 450: ...Chapter 12 Partition Utilization Reporting 432 Quantum Scalar i6000 User s Guide...
Страница 532: ...Chapter 14 Using the Command Line Interface Command Line Interface CLI Commands 514 Quantum Scalar i6000 User s Guide...
Страница 574: ...Chapter 15 Maintaining Your Library Maintenance Actions 556 Quantum Scalar i6000 User s Guide...
Страница 706: ...Chapter 15 Maintaining Your Library Robot Tower and Power Rail Health Checks 688 Quantum Scalar i6000 User s Guide...
Страница 726: ...Chapter 16 Working With Cartridges and Barcodes Managing and Moving Media 708 Quantum Scalar i6000 User s Guide...
Страница 730: ...Appendix A Frequently Asked Questions 684 Quantum Scalar i6000 User s Guide...