Regular setup: Using SKLM with a self-signed certificate
Learn to use the regular setup method to configure the key client node with the IBM® Security Key Lifecycle Manager (SKLM) key server when the server is running with a self-signed certificate rather than with a certificate chain from a certificate authority (CA).
The regular setup with SKLM requires IBM Storage Scale Advanced Edition, IBM Storage Scale Data Management Edition, or IBM Storage Scale Developer Edition or IBM Storage Scale Erasure Code Edition 4.1 or later and a supported version of SKLM. For information about supported SKLM versions, see Preparation for encryption.
- Simplified setup: Using SKLM with a certificate chain
- Regular setup: Using SKLM with a certificate chain.
- The node must have direct network access to the system where the key server is installed.
- The security-sensitive files that are created during the configuration process must have the
following characteristics:
- They must be regular files that are owned by the root user.
- The group ownership must be changed to root group.
- They must be readable and writable only by the user (mode '0600'). The following examples apply
to the regular setup with SKLM and with Thales Vormetric Data Security Manager (DSM) setup:
-rw-------. 1 root root 2446 Mar 20 12:15 /var/mmfs/etc/RKM.conf drw-------. 2 root root 4096 Mar 20 13:47 /var/mmfs/etc/RKMcerts -rw-------. 1 root root 3988 Mar 20 13:47 /var/mmfs/etc/RKMcerts/keystore_name.p12
- The RKM.conf file. For more information about this file, see The RKM.conf file and the RKM stanza.
- The files in the client keystore directory, which include the keystore file, the public and private key files for the client, and possibly other files. For more information about these files, see The client keystore directory and its files.
CAUTION:- Take appropriate precautions to ensure that the security-sensitive files are not lost or corrupted. IBM Storage Scale does not manage or replicate the files.
- Ensure that the passphrase for the client certificate file is not leaked through other means, such as the shell history.
- Client keystore files must be record-locked when the GPFS daemon starts. If the keystore files are stored on an NFS mount, the encryption initialization process can hang. The cause is a bug that affects the way NFS handles record locking. If you encounter this problem, upgrade your version of NFS or store your keystore file on a local file system. If an upgrade is not possible and no local file system is available, use a RAM drive to store the keystore files.
Part 1: Installing Security Key Lifecycle Manager
Follow the instructions in this subtopic to install and configure the IBM Security Key Lifecycle Manager (SKLM).
Part 2: Creating and exporting a server certificate
Follow the instructions in this subtopic to create and export a server certificate in SKLM:
Part 3: Configuring the remote key management (RKM) back end
An RKM back end defines a connection between a local key client, a remote key tenant, and an RKM server. Each RKM back end is described in an RKM stanza in an RKM.conf file on each node that is configured for encryption.
This subtopic describes how to configure a single RKM back end and how to share the configuration among multiple nodes in a cluster. To configure multiple RKM back ends, see Part 4: Configuring more RKM back ends
You can do Step 1 and Step 2 on any node of the cluster. In later steps, you will copy the configuration files from Step 1 and Step 2 to other nodes in the cluster.
Part 4: Configuring more RKM back ends
- Add a primary or backup key server.
- Add a key client by creating and configuring a client keystore and importing the client certificate into the SKLM server.
- Define a back end by adding a stanza to the RLM.conf file. You can share
client keystores, tenants, or key servers between stanzas. Note the following design points:
- On a single node:
- The RKM.conf file can contain multiple stanzas. Each stanza represents a connection between a key client and an SKLM device group.
- You can create multiple keystores.
- Across different nodes:
- The contents of RKM.conf files can be different.
- The contents of keystores can be different.
- If an encryption policy succeeds on one node and fails on another in the same cluster, verify
that the failing node has the correct client keystore and stanza.Remember: All nodes that mount a file system need to be able to access all the keys used in that file system.
- On a single node:
- Add encryption policies. Before you run the mmchpolicy command, ensure that
the following conditions have been met:
- The keystore files and the RKM.conf files have been copied to the proper nodes.
- The files in the client keystore directory meet the requirements for security-sensitive files that are listed in the Requirements section at the beginning of this topic.
For more information, see RKM back ends in Preparation for encryption.