The keys used by PowerPath Encryption are generated by the RKM at PowerPath's request. It's a fairly involved process to set up the key manager objects and copy the certificates to the various hosts. All told there's about five major steps when you consider generating the PKI credentials, deploying the RKM appliances, defining the PowerPath manager objects, installing the PowerPath encryption functionality and then configuring the encryption.
Thanks for the info, Rob. The reason I'm asking is I reviewed a solution with Brocade Encryption Switch working with RSA KV. In that scenario, all Keys are generated from BES not from RSA KV. It's good to know RKM can be used to generate keys with the requested initialized from other device/software.
Jingyi1
2 Intern
•
199 Posts
0
August 16th, 2011 00:00
As RSA key manager is used to manage the keys, are all keys generated by PowerPath?
taceyr
98 Posts
0
August 16th, 2011 06:00
Welcome to the community, JingYi!
The keys used by PowerPath Encryption are generated by the RKM at PowerPath's request. It's a fairly involved process to set up the key manager objects and copy the certificates to the various hosts. All told there's about five major steps when you consider generating the PKI credentials, deploying the RKM appliances, defining the PowerPath manager objects, installing the PowerPath encryption functionality and then configuring the encryption.
You can read about what's involved in the "EMC PowerPath Encryption with RSA User Guide" which is available on Powerlink at http://powerlink.emc.com/km/live1/en_US/Offering_Technical/Technical_Documentation/300-011-784.pdf?mtcs=ZXZlbnRUeXBlPUttQ2xpY2tDb250ZW50RXZlbnQsZG9jdW1lbnRJZD0wOTAxNDA2NjgwNWMyYjZlLG5hdmVOb2RlPVNvZndhcmVEb3dubG9hZHMtMg__
.
Rob
Jingyi1
2 Intern
•
199 Posts
0
August 17th, 2011 18:00
Thanks for the info, Rob. The reason I'm asking is I reviewed a solution with Brocade Encryption Switch working with RSA KV. In that scenario, all Keys are generated from BES not from RSA KV. It's good to know RKM can be used to generate keys with the requested initialized from other device/software.
Jingyi