Signing the encryption node kac certificates, Signing the, Encryption node kac certificates – Brocade Fabric OS Encryption Administrator’s Guide Supporting HP Secure Key Manager (SKM) and HP Enterprise Secure Key Manager (ESKM) Environments (Supporting Fabric OS v7.2.0) User Manual
Page 57
![background image](/manuals/361658/57/background.png)
Fabric OS Encryption Administrator’s Guide (SKM/ESKM)
37
53-1002923-01
Steps for connecting to an ESKM/SKM appliance
2
Signing the encryption node KAC certificates
The KAC certificate signing request generated when the encryption node is initialized must be
exported for each encryption node and signed by the Brocade local CA on ESKM/SKM. The signed
certificate must then be imported back into the encryption node.
1. Select Configure > Encryption from the menu task bar to display the The Encryption Center
dialog box. (Refer to
2. Select a switch from the Encryption Center Devices table, then select Switch > Export
Certificate, from the menu task bar.
The Export Switch Certificate dialog box displays.
3. Select Public Key Certificate Request (CSR), then click OK.
You are prompted to save the CSR, which can be saved to your SAN Management Program
client PC, or an external host of your choosing.
Alternatively, you may select a switch, then select Switch > Properties. Click the Export button
beside the Public Key Certificate Request, or copy the CSR for pasting into the Certificate
Request Copy area on the ESKM/SKM Sign Certificate Request page.
4. Launch the ESKM/SKM administration console in a web browser and log in.
5. Select the Security tab.
6. Select Local CAs under Certificates & CAs.
The Certificate and CA Configuration page displays.
7. Under Local Certificate Authority List, select the Brocade CA name.
8. Select Sign Request.
The Sign Certificate Request page displays.
9. Select Sign with Certificate Authority using the Brocade CA name and maximum of 3649 days.
10. Select Client as Certificate Purpose.
11. Allow Certificate Duration to default to 3649.
12. Paste the file contents that you copied in step 3 in the Certificate Request Copy area.
13. Select Sign Request.
14. Download the signed certificate to your local system as signed_kac_eskm_cert.pem or
signed_kac_skm_cert.pem, depending on your key vault type.
This file is ready to be imported to the encryption switch or blade.