5 troubleshooting, 6 support and other resources, A conventions – HP StorageWorks XP Data Integrity Check XP Software User Manual
Page 4: B dka encryption gui reference
Viewing backup data encryption license keys.............................................................................24
Data encryption license key change management workflow.........................................................24
Data encryption license key deletion workflow............................................................................25
Deleting data encryption license keys...................................................................................25
Deleting backup data encryption license keys from the server...................................................26
B DKA Encryption GUI Reference...................................................................33
Summary section...............................................................................................................33
Encryption Keys tab............................................................................................................34
Setup Key Management Server window................................................................................36
Confirm window................................................................................................................37
Edit Password Policy window...............................................................................................39
Confirm window................................................................................................................40
Backup Keys to File window................................................................................................41
Confirm window................................................................................................................42
Backup Keys to Server window............................................................................................43
Confirm window................................................................................................................44
Restore Keys from File window.............................................................................................44
Confirm window................................................................................................................45
Delete Keys window...........................................................................................................47
Confirm window................................................................................................................48
4
Contents