Installation Manual
servers. It provides an integrated solution to encrypting HDD or SSD volumes by using
256-bit XTS-AES algorithms.
• ESKM generates, stores, serves, controls, and audits access to data encryption keys. It
enables you to protect and preserve access to business-critical, sensitive, data-at-rest
encryption keys.
• iLO manages the key exchange between the ESKM and the Smart Array controller. iLO
uses a unique user account based on its own MAC address for communicating with the
ESKM. For the initial creation of this account, iLO uses a deployment user account that
pre-exists on the ESKM with administrator privileges. For more information about the
deployment user account, see the HPE Secure Encryption installation and user guide.
This feature and many others are part of a licensing package. For more information, see the
following website: http://www.hpe.com/info/ilo/licensing.
For information about HPE Secure Encryption and ESKM, see the HPE Secure Encryption
installation and user guide.
Configuring key manager servers
1. Navigate to the Administration→Key Manager page.
Using Enterprise Secure Key Manager with iLO 271