Figures
1-1. The Encryption Key Manager’s four main
components ...........1-2
1-2. Two possible locations for encryption policy
engine and key management. .....1-4
1-3. Encryption Using Symmetric Encryption
Keys..............1-6
2-1. LTO 4 or LTO 5 Tape Drive Request for
Encryption Write Operation ......2-4
2-2. LTO 4 or LTO 5 Tape Drive Request for
Encryption Read Operation ......2-5
2-3. Backup Critical Files Window .....2-6
2-4. Single Server Configuration ......2-7
2-5. Two Servers with Shared Configurations 2-8
2-6. Two Servers with Different Configurations
Accessing the Same Devices ......2-9
3-1. Choose Destination Location window 3-3
3-2. Set this version of JVM to default 3-3
3-3. Start Copying Files window ......3-4
3-4. EKM Server Configuration Page.....3-6
3-5. EKM Server Certificate Configuration Page 3-7
3-6. Backup Critical Files Window .....3-8
3-7. Create a Group of Keys .......3-15
3-8. Change Default Write Key Group 3-16
3-9. Assign Group to Drive .......3-17
3-10. Delete Drive ...........3-18
5-1. Server Status ...........5-1
5-2. Login Window ..........5-2
v
|
|
|
|
||
||
|
||