7914FDE.fm Draft Document for Review March 28, 2011 12:24 pm
464  IBM System Storage DS3500: Introduction and Implementation Guide
When the process is complete, the key is created and located as specified; also, as shown in 
Figure 15-14 the security identifier is displayed. There are three items that must be kept 
secure in order to manage any changes to the FDE drives when they are encryption enabled.
ň° Security key file created from the process
ň° Security key identifier created from the process
ň° Password used
Figure 15-14   Security key creation process complete 
The key authorizations now generated are synchronized between both controllers in the 
DS3500 storage subsystem. With these authorizations in place, arrays on the FDE drives in 
the storage subsystem can be secured.