The process of setting up encryption consists of creating
encryption and recovery keys, key servers, and encryption groups.
You can manage encryption by viewing the properties of these objects
and monitoring their status.
Encryption key server — Main page
Use this page to create, modify, or delete encryption
keys. You can also review status information.
Encryption groups — Main page
Use this page to work with an encryption group or to work
with the encryption recovery key that is associated with the encryption
group. You can also review status information.
Authorize recovery key update
If you have administrative authority and the recovery key
is in a state that requires authorization, you can use this page to
authorize a request to update the recovery key.
Delete recovery key
Use this page to start the deletion process. Before you
start this process, ensure that all logical configuration is deleted
from the encryption group. For example, delete volumes, extent pools,
and the encryption group before you start this process.
Rekey data key
If you have administrative authority, you can use this
page to rekey the data key labels for the encryption group you specify.
Enable encryption recovery key
Use this page to start the process of enabling the encryption
recovery key. This action is only available to users that are part
of the Security Administrator user group.
Disable encryption recovery key
Use this page to start the process of disabling the encryption
recovery key. This action is only available to users that are part
of the Security Administrator user group.
Initiate recovery
Use this page to start the recovery process in the event
of an encryption deadlock.