HP StoreEver MSL Tape Libraries Encryption Key Server Configuration Guide

Contents
1 Introduction...............................................................................................4
Using an encryption key server...................................................................................................4
Considerations for using an encryption key server.........................................................................5
Media compatibility for drives supporting encryption.....................................................................5
Licensing.................................................................................................................................5
Installing the encryption license..............................................................................................6
2 HP Enterprise Secure Key Manager (ESKM) integration....................................7
3 KMIP-based key server integration..............................................................12
Creating the client user name and password on the server...........................................................12
Configuring the KMIP feature for the MSL6480...........................................................................13
Using the KMIP Wizard......................................................................................................14
Configuring the KMIP feature for the 1/8 G2 Tape Autoloader and other MSL Tape Libraries...........17
Set or enter the KMIP security password................................................................................17
Entering the KMIP client credentials......................................................................................18
Generating the client certificate request.................................................................................18
Signing the client certificate on the server..............................................................................18
Installing the signed client certificate.....................................................................................19
Configuring access to the key servers....................................................................................20
Enabling KMIP-based encryption..........................................................................................21
4 Verifying that the encryption key server integration is working........................22
Connectivity test.....................................................................................................................22
Basic encryption test...............................................................................................................23
Failover test...........................................................................................................................24
5 Support and other resources......................................................................25
Contacting HP........................................................................................................................25
Typographic conventions.........................................................................................................25
6 Documentation feedback...........................................................................26
Contents 3