EasyManuals Logo
Home>Quantum>Storage>Scalar i500

Quantum Scalar i500 User Manual

Quantum Scalar i500
575 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #212 background imageLoading...
Page #212 background image
Chapter 7 Encryption Key Management
Configuring Encryption Key Management on the Library
Scalar i500 User’s Guide 193
Importing Encryption Certificates on page 198
Exporting Data Encryption Keys
on page 198
Importing Data Encryption Keys
on page 200
Accessing the SKM Server Logs
on page 201
Using the SKM Encryption Key Import Warning Log
on page 201
Generating Data Encryption Keys
7
Data encryption keys are generated in sets of a specified quantity (see the
Scalar Key Manager User’s Guide for more information).
The library tracks data encryption key usage and reminds you to generate
more keys when needed. If you try to generate data encryption keys on
an SKM server that already has sufficient unused data encryption keys,
then it will not create more. You will receive a message to that effect on
the library remote Web client.
You can generate data encryption keys in the following ways:
Generating Data Encryption Keys at Initial Setup
Generating Data Encryption Keys When 80% Depleted
Generating Data Encryption Keys When 100% Depleted
Manually Generating Data Encryption Keys
Generating Data Encryption Keys at Initial Setup 7
At initial setup, the library triggers each SKM server to generate a set of
data encryption keys. The process is described in Step 6: Configuring
Partitions for Library Managed Encryption on page 184.
Generating Data Encryption Keys When 80% Depleted
7When an
SKM server has used 80 percent of the data encryption keys assigned to a
Note: Each library that you connect to an SKM server requires its
own set of data encryption keys. Each library only pulls data
encryption keys from the set that “belongs” to it. This means
that an SKM server may contain several distinct sets of data
encryption keys. When the data encryption keys for one
library have all been used, then more keys must be
generated.

Table of Contents

Other manuals for Quantum Scalar i500

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Quantum Scalar i500 and is the answer not in the manual?

Quantum Scalar i500 Specifications

General IconGeneral
BrandQuantum
ModelScalar i500
CategoryStorage
LanguageEnglish

Related product manuals