Client registration for manual enrollment – Brocade Fabric OS Encryption Administrator’s Guide Supporting RSA Data Protection Manager (DPM) Environments (Supporting Fabric OS v7.2.0) User Manual
Page 160
140
Fabric OS Encryption Administrator’s Guide (DPM)
53-1002922-01
Steps for connecting to a DPM appliance
3
To create a Brocade encryption group, complete the following steps:
1. Identify one node (a Brocade Encryption Switch or DCX Backbone chassis with an FS8-18
blade) as the designated group leader and log in as Admin or SecurityAdmin.
2. Enter the cryptocfg
--
create
-
encgroup command followed by a name of your choice. The
name can be up to 15 characters long, and can include any alphanumeric characters and
underscores. White space or other special characters are not permitted.
The following example creates the encryption group brocade.
SecurityAdmin:switch> cryptocfg --create -encgroup brocade
Encryption group create status: Operation Succeeded.
The switch on which you create the encryption group becomes the designated group leader. After
you have created an encryption group, all group-wide operations are performed on the group
leader.
Client registration for manual enrollment
When you migrate to Fabric OS 7.1.0 from an earlier Fabric OS version, client registration is
performed automatically and no user intervention is required during the upgrade process. For new
deployments, however, identity enrollment must be performed manually for the Brocade Encryption
Switch to connect with the DPM 3.x servers. Refer to
“Steps for connecting to a DPM appliance”
Once completed, client registration occurs after key vault registration, when the Brocade
Encryption Switch attempts to connect to the DPM server for the first time.
During registration of the key vault on the Brocade Encryption Switch, the following configuration
files are created:
•
Init file: This file is created under /etc/fabos/certs/sw0/DpmInit.cfg. The init file contains
static configuration information. A sample init file is provided.
svcType=transportSvc
configName=https_cfg_1
clientCredentialFile=/etc/fabos/certs/sw0/kac.p12
clientTrustedRoots=/etc/fabos/certs/sw0/kv.pem
clientCredentialPassword=Password1
client.registrationfile=/etc/fabos/certs/sw0/DpmReg_10.37.39.33
address=https://10.37.39.33/KMS/rpc/emu
port=443
responseTimeout=10
connectRetries=0
connectTimeout=10
certHostnameVerification=false
FIPSMode=false
svcType=cacheSvc
configName=cache_cfg_1
nonPersistentCache=false
persistentCacheFile=
applicationId=B10_00_00_05_1e_53_89_eb
cachePassword=Password1
svcType=logSvc
configName=log_cfg_1
error=false
warning=false
audit=false