Rekeying the encryption recovery key
The encryption recovery key for the system can be changed by performing a rekey operation. During the rekey process, the system generates a new encryption recovery key and the existing recovery key becomes obsolete.
Consider rekeying the encryption recovery key periodically according to your organization’s security policy, or when you think the existing recovery key has been compromised or is known by an unauthorized party.
Only a single encryption method can be rekeyed at once. If you have multiple methods of encryption configured on your system, ensure that the current rekey operation is completed before starting another rekey operation.
The new encryption recovery key for the system is sensitive, so make sure that the new recovery key is stored securely in a safe location. It is suggested that the rekey procedure is used in a private location, where your browser or terminal window cannot be seen by others.
Using the management GUI
The system does not currently support rekeying the encryption recovery key by using the management GUI. Refer to the instructions described in "Using the command-line interface" section.
Using the command-line interface
Follow these steps to rekey the encryption recovery key:
- The current recovery key must be supplied to the system within 30 minutes of starting a rekey.
To validate the current recovery key, enter the following
command:
An interactive prompt is displayed on the screen. When the correct recovery key has been entered, a success message appears.chencryption -recoverykey validate Enter the recovery key for the system: - To start the rekey process, enter the following command to prepare a new recovery
key:
The new recovery key will be displayed on screen.chencryption -recoverykey newkey -key prepareNote: The recovery key is sensitive and must be stored in a safe location.The system creates an identifier for the new recovery key, which can be used as a label when storing the key in a safe location (for example, in a password manager).
- To confirm that the recovery key has been stored correctly, the system requires the recovery key
to be confirmed. To confirm the recovery key, run the following command and enter the new recovery
key when prompted:
A confirmation message is displayed when the recovery key has been entered correctly.chencryption -recoverykey newkey -key confirm Enter the new recovery key for the system: - Commit the recovery key by running the following
command:
For more information, see chencryption command.chencryption -recoverykey newkey -key commitThe recovery key has been rekeyed successfully when the recovery_key_name field shows the name of the new recovery key, and the recovery_key_rekey_name field will be blank. For more information, see lsencryption command.