Smart card usage, Using authentication cards with a card reader – Brocade Fabric OS Encryption Administrator’s Guide Supporting NetApp Lifetime Key Manager (LKM) and KeySecure Storage Secure Key Manager (SSKM) Environments (Supporting Fabric OS v7.2.0) User Manual
Page 34
![background image](/manuals/361663/34/background.png)
16
Fabric OS Encryption Administrator’s Guide (LKM/SSKM)
53-1002925-01
Smart card usage
2
Smart card usage
Smart Cards are credit card-sized cards that contain a CPU and persistent memory. Smart cards
can be used as security devices. You must have Storage Encryption Security user privileges to
activate, register, and configure smart cards.
Smart cards can be used to do the following:
•
Control user access to Brocade Network Advisor security administrator roles
•
Control activation of encryption engines
•
Securely store backup copies of master keys
Smart card readers provide a plug-and-play interface that allows you to read and write to a smart
card. The following smart card readers are supported:
•
GemPlus GemPC USB
http://www.gemalto.com/readers/index.html
•
Indentive
http://www.indentive-infrastructure.com
NOTE
Only the Brocade smart cards that are included with the encryption switches are supported.
Using authentication cards with a card reader
When authentication cards are used, one or more authentication cards must be read by a card
reader attached to a a Brocade Network Advisor workstation to enable certain security-sensitive
operations. These include the following:
•
Performing master key generation, backup, and restore operations.
•
Registering or deregistering and replacement of authentication cards.
•
Enabling and disabling the use of system cards.
•
Changing the quorum size for authentication cards.
Storage Encryption
Security
•
Launch the Encryption center dialog box.
•
View switch, group, or engine properties.
•
View Encryption Group Properties Security tab.
•
View LUN centric view.
•
View all rekey sessions.
•
View encryption targets, hosts, and LUNs.
•
Create a master key.
•
Backup a master key.
•
Edit smart card.
•
View and modify settings on the Encryption Group Properties Security tab (quorum size,
authentication cards list and system card requirement).
•
Establish link keys for LKM/SSKM key managers.
•
Show tape LUN statistics.
TABLE 1
Encryption privileges (Continued)
Privilege
Read/Write