Configuring encryption with the Thales CipherTrust Manager key server by using a local certificate authority
The topic describes a regular setup for encryption with Thales CipherTrust Manager by using a local certificate authority (CA).
Setting up an encryption environment with CipherTrust Manager as the key server requires
IBM
Storage Scale Data Management Edition 5.1 or later
and a supported version of CipherTrust Manager. For more information, see the subtopic Required
software: Remote Key Management (RKM) server
in the help topic Preparation for encryption.
IBM Storage Scale supports CipherTrust Manager 2.5.x and 2.8 or later. CipherTrust Manager 2.6 and 2.7 are not supported. For more information, see CipherTrust Manager Administration Guide.
Prerequisites:- The node must have direct network access to the system where the key server is installed.
- The security-sensitive files that are created during the configuration must have the following
characteristics:
- They must be regular files that are owned by the root user.
- They must be in the root group.
- They must be readable and writable only by the user (mode '0600'). The following examples apply
to the regular setup and the CipherTrust Manager setup:
-rw-------. 1 root root 2446 Mar 20 12:15 /var/mmfs/etc/RKM.conf drw-------. 2 root root 4096 Mar 20 13:47 /var/mmfs/etc/RKMcerts -rw-------. 1 root root 3988 Mar 20 13:47 /var/mmfs/etc/RKMcerts/keystore_name.p12
- The RKM.conf file. For more information about this file, see The RKM.conf file and the RKM stanza.
- The files in the client keystore directory, which include the keystore file, the public and private key files for the client, and possibly other files. For more information about these files, see The client keystore directory and its files.
CAUTION:- Ensure that the security-sensitive files are not lost or corrupted. IBM Storage Scale does not manage or replicate the files.
- Ensure that the passphrase for the client certificate file is not leaked through other means, such as the shell history.
- Client keystore files must be record-locked when the GPFS daemon starts. If the keystore files are stored on an NFS mount, the encryption initialization can hang. The cause is a bug that affects the way NFS handles record locking. If you encounter this problem, upgrade your version of NFS or store your keystore file on a local file system. If an upgrade is not possible and no local file system is available, use a RAM drive to store the keystore files.
See the following subtopics for instructions:
Part 1 - Configuring the CipherTrust Manager key server
The following instructions describe how to configure the CipherTrust Manager key server to communicate with an IBM Storage Scale key client.
Install and configure a Key Management Interoperability Protocol (KMIP)-enabled CipherTrust Manager key server. For more information, see CipherTrust Manager Administration Guide.
- A local Certificate Authority (CA)
- An external Certificate Authority (CA)
Part 2 - Creating credentials for the key client
To create credentials for the key client, complete to the following steps: