Regular setup: Using SKLM with a certificate chain
Learn to use the regular setup method to configure the key client node with the IBM® Security Key Lifecycle Manager (SKLM) key server when the server is running with a certificate chain from a certificate authority (CA) rather than with a self-signed server certificate.
The regular setup method with SKLM requires IBM Storage Scale Advanced Edition, IBM Storage Scale Data Management Edition, or IBM Storage Scale Developer Edition or IBM Storage Scale Erasure Code Edition V4.1 or later and a supported version of SKLM. For information about supported SKLM versions, see Preparation for encryption.
- Simplified setup: Using SKLM with a self-signed certificate
- Regular setup: Using SKLM with a self-signed certificate
- The node must have direct network access to the system where the key server is installed.
- The security-sensitive files that are created during the configuration process must have the
following characteristics:
- They must be regular files that are owned by the root user.
- The group ownership must be changed to root group.
- They must be readable and writable only by the user (mode '0600'). The following examples apply
to the regular setup with SKLM and with Thales Vormetric Data Security Manager (DSM) setup:
-rw-------. 1 root root 2446 Mar 20 12:15 /var/mmfs/etc/RKM.conf drw-------. 2 root root 4096 Mar 20 13:47 /var/mmfs/etc/RKMcerts -rw-------. 1 root root 3988 Mar 20 13:47 /var/mmfs/etc/RKMcerts/keystore_name.p12
- The RKM.conf file. For more information about this file, see The RKM.conf file and the RKM stanza.
- The files in the client keystore directory, which include the keystore file, the public and private key files for the client, and possibly other files. For more information about these files, see The client keystore directory and its files.
CAUTION:- Take appropriate precautions to ensure that the security-sensitive files are not lost or corrupted. IBM Storage Scale does not manage or replicate the files.
- Ensure that the passphrase for the client certificate file is not leaked through other means, such as the shell history.
- Client keystore files must be record-locked when the GPFS daemon starts. If the keystore files are stored on an NFS mount, the encryption initialization process can hang. The cause is a bug that affects the way NFS handles record locking. If you encounter this problem, upgrade your version of NFS or store your keystore file on a local file system. If an upgrade is not possible and no local file system is available, use a RAM drive to store the keystore files.
Part 1: Installing Security Key Lifecycle Manager
Follow the instructions in this subtopic to install and configure the IBM Security Key Lifecycle Manager (SKLM).
Part 2: Configuring SKLM
Part 3: Configuring the remote key management (RKM) back end
To configure a remote key management (RKM) back end, you must create and initialize a client keystore and you must create an RKM stanza in the RKM.conf file on the IBM Storage Scale node: