installation-and-administration-guide
installation-and-administration-guide
E41579-14
August 2022
Oracle Key Manager 3 Installation and Administration Guide,
E41579-14
This software and related documentation are provided under a license agreement containing restrictions on
use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your
license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license,
transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse
engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is
prohibited.
The information contained herein is subject to change without notice and is not warranted to be error-free. If
you find any errors, please report them to us in writing.
If this is software, software documentation, data (as defined in the Federal Acquisition Regulation), or related
documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S.
Government, then the following notice is applicable:
U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software,
any programs embedded, installed, or activated on delivered hardware, and modifications of such programs)
and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end
users are "commercial computer software," "commercial computer software documentation," or "limited rights
data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental
regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation
of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated
software, any programs embedded, installed, or activated on delivered hardware, and modifications of such
programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and
limitations specified in the license contained in the applicable contract. The terms governing the U.S.
Government's use of Oracle cloud services are defined by the applicable contract for such services. No other
rights are granted to the U.S. Government.
This software or hardware is developed for general use in a variety of information management applications.
It is not developed or intended for use in any inherently dangerous applications, including applications that
may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you
shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its
safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this
software or hardware in dangerous applications.
Oracle®, Java, and MySQL are registered trademarks of Oracle and/or its affiliates. Other names may be
trademarks of their respective owners.
Intel and Intel Inside are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are
used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Epyc,
and the AMD logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered
trademark of The Open Group.
This software or hardware and documentation may provide access to or information about content, products,
and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly
disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise
set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not be
responsible for any loss, costs, or damages incurred due to your access to or use of third-party content,
products, or services, except as set forth in an applicable agreement between you and Oracle.
Contents
Preface
What's New xv
Related Documentation xvi
Documentation Accessibility xvi
Diversity and Inclusion xvi
iii
Managed Switches 1-17
Network Routing Configuration 1-18
Part Numbers for OKM Components 1-18
iv
Set the Key Pool Size (using QuickStart) 3-13
Select Certificate Signature Algorithm (using QuickStart) 3-13
Synchronize the KMA Time (using QuickStart) 3-13
Add a KMA to an Existing Cluster 3-14
Restrictions on Adding a New KMA to a Cluster 3-15
Accelerate Updates to the New KMA in a Cluster 3-15
Restore a Cluster from a Backup 3-16
Create Security Officer and Provide Quorum Login 3-16
Set Time Information 3-17
v
Switch Encryption On and Off 6-8
Use Tokens to Transfer Encryption Keys 6-8
Rebuild the Media Information Region for T10000 Drives 6-8
9 Monitor KMAs
Configure SNMP 9-1
SNMP Protocol Versions 9-1
SNMP MIB Data 9-1
View SNMP Managers for a KMA 9-2
Create a New SNMP Manager 9-2
Modify an SNMP Manager's Details 9-3
Delete an SNMP Manager 9-3
Configure the Hardware Management Pack (HMP) 9-3
Download the HMP MIBs from the OKM Manager GUI 9-4
HMP Prerequisites 9-4
Enable/Disable HMP 9-5
Display the Current Load 9-5
View and Export Audit Logs 9-5
vi
Audit Log - Field Descriptions 9-5
Create a System Dump 9-6
Send Messages to Remote Syslog Servers 9-7
Configure TLS for Remote Syslog Communication 9-7
Create a Remote Syslog Server 9-8
View or Modify Remote Syslog Details 9-9
Test Remote Syslog Support 9-9
Delete a Remote Syslog Server 9-9
10 Backups
What is a Core Security Backup? 10-1
What is a Database Backup? 10-1
Considerations When Performing Backups and Key Sharing 10-2
View Backup File Information 10-2
Backup List - Field Descriptions 10-3
Create a Core Security Backup 10-3
Create a Database Backup 10-4
Restore a Backup 10-4
Destroy a Backup 10-5
vii
Create the Transfer Partner 11-10
Assign Key Groups to a Transfer Partner 11-11
Export a Transfer Partner Key 11-11
Import Transfer Partner Keys 11-12
View and Modify the Transfer Partner List 11-13
View the Key Transfer Public Key List 11-13
Delete a Transfer Partner 11-13
Sharing Keys with Older Clusters 11-13
viii
Set an Agent's Passphrase 12-14
Assign Key Groups to an Agent 12-15
Delete Agents 12-15
Query Agent Performance 12-15
Manage Data Units 12-16
View and Modify Data Units 12-16
Data Unit List - Field Descriptions 12-16
View Data Unit Key Details 12-17
Key List - Field Descriptions 12-18
View Backups with Destroyed Data Unit Keys 12-19
How OKM Determines if a Backup Contains a Data Unit Key 12-19
View Key Counts for a Data Unit 12-20
Destroy Keys for a Data Unit 12-20
13 Quorum Authentication
What Occurs If You Do Not Enter a Quorum 13-1
Operations that Require a Quorum 13-1
View and Modify the Key Split Configuration 13-2
View Pending Operations 13-2
Approve Pending Quorum Operations 13-3
Delete Pending Quorum Operations 13-3
14 OKM Console
Log into the KMA 14-1
User Role Menu Options 14-1
Operator Menu Options 14-2
Security Officer Menu Options 14-2
Combined Operator and Security Officer Menu Options 14-2
Menu Options for Other Roles 14-3
OKM Console Functions 14-3
Log KMA Back into Cluster 14-4
Set a User's Passphrase 14-4
Set KMA Management IP Addresses 14-5
Set KMA Service IP Addresses 14-6
View, Add, and Delete Gateways 14-7
Set Acceptable TLS Versions 14-7
Specify the DNS Settings 14-7
Reset the KMA to the Factory Default 14-8
Restart the KMA 14-8
ix
Shutdown the KMA 14-8
Enable the Technical Support Account (using OKM Console) 14-9
Technical Support Account Password Requirements 14-10
Disable the Technical Support Account 14-10
Enable the Primary Administrator 14-10
Disable the Primary Administrator 14-11
Show Properties of the Root CA Certificate 14-11
Renew the Root CA Certificate 14-11
SHA Compatibility 14-12
Log Out of Current OKM Console Session 14-12
16 Certificates
Generate and Sign Certificates Using SHA-256 16-1
Renew the Root Certificate 16-1
Create an OKM Backup After Renewing a Certificate 16-2
Retrieve the New Root CA on Peer KMAs (optional) 16-2
Reissue Certificates for Agents (optional) 16-2
Update Users Passphrase (optional) 16-3
Update Disaster Recovery Records 16-3
Ongoing Renewal Policy for the Root CA Certificate 16-3
Save a Client Certificate 16-3
Convert PKCS#12 Format to PEM Format 16-4
A Disaster Recovery
Recover a KMA A-1
Example Scenarios for Recovering Data A-2
Replicate from Another Site A-2
Dedicated Disaster Recovery Site A-4
Shared Resources for Disaster Recovery A-5
x
Key Transfer Partners for Disaster Recovery A-7
C Switch Configurations
Brocade ICX 6430 Switch Configuration C-1
Extreme Network Switch Configuration C-3
3COM Network Switch Configuration C-3
xi
Loss of the pkcs11_kms Configuration Directory D-18
No Slots Available Error When Using pkcs11_kms D-18
CKA_GENERAL_ERROR Error When Using pkcs11_kms D-18
Could Not Open PKCS#12 File Error D-18
Index
xii
List of Figures
1-1 OKM Cluster Overview 1-2
1-2 Single Site Configuration 1-3
1-3 Dual Site Configuration 1-3
1-4 Database Example 1-4
1-5 Disaster Recovery Configuration 1-4
1-6 Multiple Site Configuration 1-6
1-7 KMA Network Connections Example — SPARC T7-1 1-15
1-8 Managed Switch Configuration 1-18
11-1 Key Lifecycle Periods 11-2
11-2 State Transition Diagram 11-4
A-1 Replication from Another Site—No WAN Service Network A-3
A-2 Replication from Another Site—WAN Service Network A-4
A-3 Pre-positioned Equipment at a Dedicated Disaster Recovery Site A-5
A-4 Shared KMAs A-7
A-5 Transfer Key Partners A-8
B-1 OKM Connected with an SL4000 Tape Library B-2
D-1 OKM Cluster with TDE D-2
xiii
List of Tables
1-1 FIPS 140-2 Compliant Tape Drives 1-9
1-2 T-Series Tape Drive Encryption Behavior 1-9
1-3 LTO 5,6,7,8 and 9 Encryption Behavior 1-10
1-4 Minimum Drive Firmware Requirements 1-11
1-5 Minimum Virtual Op Panel (VOP) Version 1-12
1-6 OKM Support for Each Server Platform 1-13
1-7 KMA Network Connections - T8-1 and T7-1 1-15
1-8 KMA Server Order Numbers 1-18
1-9 Switch Accessory Kit Order Numbers 1-19
1-10 Ethernet Cable Order Numbers 1-19
1-11 Power Cable Part Numbers 1-19
1-12 Oracle Rack II (Redwood) Power Cord Part Numbers 1-20
1-13 Oracle Rack (NGR) Power Cord Part Numbers 1-21
1-14 Non-Oracle Rack Power Cord Part Numbers 1-21
2-1 KMA Network Connections - T8-1 and T7‐1 2-7
3-1 Tape Drive TLS Compatibility 3-10
6-1 Tape Drives Supported by OKM 6-2
8-1 System Operations/User Roles 8-4
9-1 KMA Object Identifiers 9-2
11-1 Determining Export Format 11-10
11-2 Required Settings for Exporting a Key 11-11
12-1 Replication Version Features 12-10
15-1 OKM Command Line Utility - User Role Access 15-2
F-1 Server Firmware Levels F-2
F-2 ILOM Configuration and Security Hardening F-5
xiv
Preface
This guide provides planning, overview, configuration, and administration information for the
Oracle Key Manager (OKM) software. This guide is intended for storage administrators,
system programmers, and operators responsible for configuring and maintaining the OKM
software at their site.
What's New
This section summarizes new and enhanced features for Oracle Key Manager 3.
xv
Preface
Related Documentation
For additional OKM documentation, see: http://docs.oracle.com/en/storage/storage-
software/oracle-key-manager/index.html.
Documentation Accessibility
For information about Oracle's commitment to accessibility, visit the Oracle
Accessibility Program website at http://www.oracle.com/pls/topic/lookup?
ctx=acc&id=docacc.
xvi
1
About Oracle Key Manager
Oracle Key Manager (OKM) provides data security by creating, storing, and managing the
encryption keys to encrypt stored data (device-based encryption). OKM supports both open
systems and enterprise platforms.
• OKM Clusters
• Agents (Encryption Endpoints)
• Key Management Appliance
• Networking
• Part Numbers for OKM Components
OKM Clusters
A cluster is a group of Key Management Appliances (KMAs) that are aware of each other and
fully replicate information to each other. The cluster provides encryption endpoints (agents) a
high availability service from which they can retrieve keys.
• Clusters must contain a minimum of two KMAs and maximum of 20 KMAs.
• New keys generated at any site replicate to all other KMAs in the cluster.
• You can define sites to provide a logical grouping of KMAs within the cluster, for example
a site representing the KMAs in a particular data center. You can associate encryption
agents with a specific site to preference KMAs within that site.
• All administrative changes propagate to all other KMAs in the cluster.
• You can cluster multiple KMAs con a dedicated private, local, or wide area network.
• Any KMA in a cluster can service any agent on the network.
• You can use any KMA in the cluster for administration functions.
Note:
KMAs in one cluster will be unaware of those in other clusters.
1-1
Chapter 1
OKM Clusters
Monitoring OKM
OKM supports monitoring using remote syslog, SNMP, or Oracle Hardware
Management Pack. The Oracle Service Delivery Platform (SDP2) may be deployed for
monitoring tape libraries and their encrypting tape drives on the service network.
1-2
Chapter 1
OKM Clusters
The figure below shows a single site with two KMAs in a cluster. The service network
includes multiple tape drives (agents).
In the figure below, four KMAs in a cluster are supporting two automated tape libraries and an
Oracle database with Advanced Security Transparent Data Encryption (TDE) solution. For
more information, refer to Advanced Security Transparent Data Encryption (TDE).
1-3
Chapter 1
OKM Clusters
1-4
Chapter 1
OKM Clusters
1-5
Chapter 1
Agents (Encryption Endpoints)
1-6
Chapter 1
Agents (Encryption Endpoints)
Discovery
Agents (encryption endpoints) send a discover cluster request to a KMA. The KMA that
receives the discover cluster request provides the following information for each KMA: IP
addresses (IPv4 and IPv6), Site Name, KMA ID, KMA Name, KMA Version, KMA Status. The
status can be either responding (indicates if the KMA is responding on the network) or locked
(indicates if the KMA is currently locked).
Agents periodically retrieve this information as part of a key request operation (not when the
endpoint is idle) and always request it as part of enrollment and whenever the agent is IPLed.
Whenever an agent discovers a new response state for a KMA, it updates the cluster
information with the new status.
Load Balancing
During normal operations, agents use their local table of cluster information to select a KMA
for key retrieval. The agents use an algorithm to select a KMA from the same site as the
agent. If all KMAs within a site are either locked or not responding, then the agents attempts
to access a KMA from another site. If KMAs from other sites cannot be reached, the attempt
to retrieve keys will time out and force a failover.
Failover
The ability for agents to failover to remote sites can improve agent reliability and availability
when local KMAs are down or slow to respond (such as timeout situations because of heavy
workloads).
Whenever an agent cannot communicate with any of the KMAs in a cluster, the agent then
uses an algorithm to select a KMA for a failover attempt. When selecting, the agent's
information about the cluster state is used again. agents attempt a failover up to three times
before giving up and returning an error to the host application.
An agent may occasionally choose a non-responding KMA during a failover attempt if all
other KMAs are not responding. However, because information about the cluster may be
stale, the KMA may actually be online and responding
1-7
Chapter 1
Agents (Encryption Endpoints)
1-8
Chapter 1
Agents (Encryption Endpoints)
Note:
LTO drives alone may be FIPS-validated, but not necessarily in specific encryption
applications.
FIPS 140-2 levels of security for the above tape drives include:
• Level 1 – The basic level with production-grade requirements.
• Level 2 – Adds requirements for physical tamper evidence and role-based authentication.
Built on a validated operating platform. This selection provides a higher level of security
for the KMAs and tape drives.
1-9
Chapter 1
Agents (Encryption Endpoints)
1-10
Chapter 1
Agents (Encryption Endpoints)
1-11
Chapter 1
Agents (Encryption Endpoints)
Legend:
L – library firmware level
D – drive firmware level
FC– Fibre Channel
NA – Not Applicable. Not supported.
Note:
If you use Multi-Drive Virtual Operator Panel (MD-VOP), version 1.1
(minimum) is required. It is recommended that you use the most current
version of MD-VOP.
1-12
Chapter 1
Key Management Appliance
1-13
Chapter 1
Networking
Networking
OKM uses TCP/IP networking (dual stack IPv4 and IPv6) for the connections between
KMAs, agents, and workstations.
Tape drive agents should not be on public networks. Connect tape drive agents to
KMAs in a private service network.
• Network Connections on the KMA
• Managed Switches
1-14
Chapter 1
Networking
Note:
Each Ethernet connection requires an IP address. Addresses not assigned using
DHCP must be static.
1-15
Chapter 1
Networking
Management Network
The management network connects the KMA to other KMAs in the cluster for peer-to-
peer replication.
The OKM Manager GUI, CLI, and other admin tools (such as Remote Console and
SNMP) use the management network. Customers are expected to provide the
management network. Use a gigabit Ethernet, or faster, connection for optimal
replication and performance.
Agents may also connect to the management network if the service network is
inappropriate due to its isolation properties. For additional security and to isolate LAN
traffic, you may want to use Virtual Local Area Networks (VLANs) to connect to the
management network.
1-16
Chapter 1
Networking
Note:
A System Dump using the Management GUI will contain aggregated port information. The
information is gathered using dladm commands.
Managed Switches
Oracle recommends a managed switch for connecting KMAs to encryption agents on private
service networks. A managed switch supplies connectivity to unmanaged switches and to
routers for the wide area service network.
Managed switches:
• Improve serviceability through better switch diagnostics and service network
troubleshooting.
• Can minimize single points of failure on the service network through use of redundant
connections and spanning tree protocol.
• Provide support for aggregation of the KMA service network interfaces to minimize single
point of failure on the KMA's service interface.
Port Mirroring
You can mirror ports to use a network analyzer in the service network. Ports can be mirrored
on Brocade ICX 6430 switches. For configuration instructions, consult Brocade ICX 6430
Switch Configuration.
1-17
Chapter 1
Part Numbers for OKM Components
Note:
Oracle does not recommend starting with a multi-site service network
topology.
1-18
Chapter 1
Part Numbers for OKM Components
The switch can support a maximum of 22 tape drive agents. Additional switch accessory kits
might be needed depending on the number of encrypting tape drives supported by the library.
Order Ethernet cables to connect the switch to encrypting tape drives.
1-19
Chapter 1
Part Numbers for OKM Components
1-20
Chapter 1
Part Numbers for OKM Components
1-21
2
Install the KMA
Use these procedures to install SPARC KMAs and initially configure the ILOM.
Caution:
Installation is a two person task due to the weight of the server. Attempting
installation alone could result in injury or equipment damage.
2-1
Chapter 2
Prepare for the Installation
https://docs.oracle.com/en/servers/sparc/t8/index.html
– For the SPARC T7-1 server specifications, see:
http://docs.oracle.com/cd/E54976_01/
– Verify the circuit breaker locations and ratings.
– For the redundant power option, ensure there is an additional APC power
switch.
• Have the customer consider applying tamper evident security labels to each KMA.
Customers are responsible for acquiring these labels.
Review Network Requirements:
• See Networking
Review Agent Requirements:
• See Agents (Encryption Endpoints)
Plan User Roles:
• See Available Roles
• See Valid Operations for Each Role
Prepare for Delivery:
• Ensure authorized personnel are available to handle and accept delivery. The
OKM Key Management Appliance (KMA) is considered a secure item.
• Ensure there is a plan to dispose of or recycle packing material.
Order Components:
• Select Part Numbers for OKM Components
2-2
Chapter 2
Prepare for the Installation
Note:
Two-post racks are not supported by the T7-1 or T8-1 servers.
Only 9.5 mm square hole and M6 round mounting holes are supported.
The sliding rails are compatible with racks which meet the following standards:
• Horizontal opening and unit vertical pitch conforming to ANSI/EIA 310-D-1992 or IEC
60927 standards.
• Distance between front and rear mounting planes between 610 mm and 915 mm (24 in.
to 36 in.).
• Clearance depth to a front cabinet door must be at least 27 mm (1.06 in.).
• Clearance depth to a rear cabinet door at least 900 mm (35.5 in.) to incorporate cable
management or 700 mm (27.5 in.) without cable management.
• Clearance width between structural supports and cable troughs and between front and
rear mounting planes is at least 456 mm (18 in.).
Provide adequate service clearance for rack components:
• Front service clearance 48.5 in. (1.23 m) minimum
• Rear service clearance 36 in. (914.4 mm) minimum
Consider the total weight when you place equipment into the rack. To prevent an unbalanced
situation:
• Load equipment in a rack from the bottom to the top.
• Install the heaviest equipment on the bottom and the lightest on the top.
• Install an anti-tilt bar (if necessary) to provide additional stability.
Verify there is adequate cooling for the servers.
• Ensure that the temperature in the rack does not exceed the maximum ambient rated
temperatures for all of the equipment installed in the rack.
• Ensure that there is adequate cooling to support all of the equipment in the rack.
Verify the rack has the proper power connections and ground.
• When removing power from any equipment, make sure it does not effect other equipment
in the rack.
2-3
Chapter 2
Prepare for the Installation
SPARC T8‐1
• SPARC T8 Series Servers Product Notes
• SPARC T8 Series Servers Security Guide
• SPARC T8‐1 Installation Guide
• SPARC T8 Series Servers Administration Guide
• SPARC T8‐1 Server Service Manual
https://docs.oracle.com/en/servers/sparc/t8/index.html
SPARC T7‐1
• SPARC T7 Series Servers Product Notes
• SPARC T7 Series Security Guide
• SPARC T7‐1 Installation Guide
• SPARC T7 Series Servers Administration Guide
• SPARC T7‐1 Server Service Manual
2-4
Chapter 2
SPARC T7-1 or T8-1 Server Installation
http://docs.oracle.com/cd/E54976_01/
1. Acclimate the server to the installation environment. The server should remain in the
shipping crate for at least 24 hours.
2. Prepare the KMA and rack for installation. Tasks include:
• Stabilize a rack
• Unpack the contents of the shipping crate.
• Install the rackmount hardware
• Attach slide rail assemblies to the rack
3. Install the server in the rack using the supplied hardware. Tasks include:
• Install the server into the slide rail assemblies
• (Optional) Prepare the cable management assembly (CMA) for installation
• Attach the CMA to the server, if applicable
• Verify operation of the slide rails and CMA
4. Connect cables to the KMA:
2-5
Chapter 2
Initial ILOM Configuration
Caution:
Do not apply power until instructed to do so.
This appliance includes a service processor (SP) that is used to
configure and boot the host server. To properly configure the host
server and view SP messages, do not apply power to the server until
you make the SP and host networking connections.
Note:
This section has some basic ILOM commands to configure the server. Refer
to the Integrated Lights Out Manager Administration Guide for more
information.
2-6
Chapter 2
Initial ILOM Configuration
5. Connect a null modem serial cable to the SER MGT port. Connect the other end to a
laptop PC serial port.
6. Start a HyperTerminal session on the laptop. This allows you to watch the boot process.
7. Verify the default settings are:
• 8-bits
• No Parity
• 1 stop-bit
• 9600 baud rate
• Disable both hardware (CTS/RTS) and software (XON/XOFF) flow control
8. Connect the server power cord to the power source. Do not power-on the server. The
ILOM starts as soon as you connect power.
9. Once the boot completes, press [Enter] a few times to get to the ILOM login prompt. Log
in as the system root user. See ILOM Security Hardening for details about this user.
10. Configure the ILOM IP address.
11. Enter the following commands. These commands are case sensitive.
2-7
Chapter 2
Initial ILOM Configuration
12. On a SPARC T8-1 or SPARC T7‐1 server, enter the following commands to set the
auto-boot property. There is a space after the question mark but not before it.
These commands are case sensitive.
show /HOST/bootmodeset /HOST/bootmode script="setenv auto-boot? true"show /
HOST/bootmode
14. Go to Launch the QuickStart from the ILOM Web Interface to continue the
installation.
2-8
3
Configure a KMA with QuickStart
Use the QuickStart program to configure a newly-installed, factory-default KMA.
• About the QuickStart Wizard
• Launch the KMA QuickStart Program
• Record the Configuration Information
• Review QuickStart Information
• Configure the Network in QuickStart
• Name the KMA
• Create a New Cluster with QuickStart
• Add a KMA to an Existing Cluster
• Restore a Cluster from a Backup
Caution:
Do not perform a "Core Security Backup" when using "simple settings" or settings
that will change before going to a production environment. Wait until all user's have
entered their appropriate credentials, passphrases, and quorum details before
creating a Core Security Backup for the first time.
3-1
Chapter 3
About the QuickStart Wizard
Best Practices When Running the QuickStart Wizard after KMA Installation
During the initial configuration when all the required users may not be available, use
simple entries when entering information such as the key split size, split threshold, and
quorum. For example, use an initial value such as 1 of 1.
Once the structure of the KMAs and the OKM Cluster are complete, you can change
this information to the production values at a later time using the OKM Manager. This
can help speed up the installation and configuration.
During the QuickStart Wizard, customers will want to keep the following information
confidential: User IDs, Passphrases, and Key Split Credentials.
Note:
DNS requires an IPv4 address/protocol, IPv6 is not used.
3-2
Chapter 3
About the QuickStart Wizard
Note:
A KMA Name cannot be altered once set using the QuickStart program. It can
only be changed by resetting the KMA to the factory defaults and running
QuickStart again.
Note:
The recommendation for maximum security is to use the default and have
Autonomous Unlocking off. Autonomous unlocking selection:
3-3
Chapter 3
Launch the KMA QuickStart Program
Note:
Unlocking requires a quorum.
Note:
Do not make a mistake setting the system time manually. Adjustments
through the OKM Manager GUI are restricted to plus, or minus, 5
minutes per day.
3-4
Chapter 3
Launch the KMA QuickStart Program
12. Once the KMA startup completes, the KMA QuickStart program automatically launches
and guides you through the initial KMA configuration. See Review QuickStart Information.
3-5
Chapter 3
Record the Configuration Information
where SP_address is the IP address of the KMA Service Processor. This was
assigned by your Oracle Service Representative at installation.
2. Log in using the system root account and password.
3. Display the power status of the KMA.
-> show /System power_state
6. Monitor the startup messages that appear in the Remote Host Console, including
the status of the hardware security module.
Console unavailable while KMA Maintenance is in progress...
7. Once the KMA startup completes, the KMA QuickStart program automatically
launches and guides you through the initial KMA configuration. See Review
QuickStart Information.
3-6
Chapter 3
Review QuickStart Information
Threshold:
Number defined:
Key split user names and passphrases
Initial Security Officer
User name:
Passphrase:
Key Pool Size (typically 1000):
Certificate Signature Algorithm (SHA 256 /SHA-1):
Autonomous Unlock (yes/no):
External NTP server (if any):
Note:
If you press Ctrl‐c anytime during the QuickStart program, no changes are saved
and you return to the Welcome screen.
1. This procedure assumes you have launched the QuickStart. If not, see Launch the KMA
QuickStart Program.
2. Review the instructions on the QuickStart Welcome screen and press Enter.
3. Proceed to Configure the Network in QuickStart.
3-7
Chapter 3
Configure the Network in QuickStart
1. To access the following prompts of the QuickStart, make sure you have completed
Review QuickStart Information.
2. Type either n or y to configure IPv6.
3. Type either n or y to use DHCP for the IPv4 interface.
Note:
If you elect to use DHCP, any host name information provided by the
DHCP server is ignored. Any DNS information provided by the DHCP
server is presented in Set DNS Configuration (using QuickStart).
Note:
QuickStart will disable the support account after you complete Set DNS
Configuration (using QuickStart). After completing the QuickStart, you
can enable or disable the support account at anytime using the OKM
console (see Enable the Technical Support Account (using OKM
Console)).
3-8
Chapter 3
Configure the Network in QuickStart
2. At the Please choose one of the following: prompt, type 1, 2, 3, or 4 and press
Enter.
(1) Add a gateway
(2) Remove a configured gateway (only if modifiable)
(3) Exit gateway configuration
(4) Display again
Note:
If you elected to use DHCP on the management network in Set KMA Management
IP Addresses (using QuickStart), the KMA displays any DNS settings from a DHCP
server on the management network. You can enter information to override these
DNS settings.
3-9
Chapter 3
Name the KMA
3-10
Chapter 3
Create a New Cluster with QuickStart
Note:
The Key Split user names and passphrases are independent of other user
accounts that are established for KMA administration. Oracle recommends that
key split user names be different from KMA user names.
3-11
Chapter 3
Create a New Cluster with QuickStart
Note:
All KMAs have their own passphrases that are independent of
passphrases assigned to users and agents. The first KMA in a cluster is
assigned a random passphrase. If this KMA's certificate expires, and you
want to retrieve its entity certificate from another KMA in the cluster, you
would have to use the OKM Manager to set the passphrase to a known
value. For procedures, refer to Change a KMA Passphrase (Log the
KMA Out of the Cluster).
Caution:
While enabling autonomous unlocking is more convenient and increases the
availability of the OKM cluster, it creates security risks.
When autonomous unlocking is enabled, a powered-off KMA must retain
sufficient information to start up fully and begin decrypting stored keys. This
means a stolen KMA can be powered up, and an attacker can begin
extracting keys for the KMA. While it is not easy to extract keys, a
knowledgeable attacker will be able to dump all keys off the KMA. No
cryptographic attacks are needed.
If autonomous unlocking is disabled, cryptographic attacks are required to
extract keys from a stolen KMA.
3-12
Chapter 3
Create a New Cluster with QuickStart
Note:
You can provide an IPv6 address for this NTP server. This IPv6 address must
not include square brackets or a prefix length.
2. If an NTP server is not available, press Enter. Then, enter the date and time in one of the
specified formats, or press Enter to use the displayed date and time.
3. At the prompt, press Enter. KMA initialization is complete.
4. Press Enter to exit. The QuickStart program terminates and a login prompt is displayed
(refer to Log into the KMA ). The KMA now has the minimum system configuration that is
required to communicate with the OKM Manager.
5. Your next step is to use OKM Manager to connect to and configure the cluster. For
procedures, refer to Configure the Cluster .
3-13
Chapter 3
Add a KMA to an Existing Cluster
Prerequisites:
1. See Restrictions on Adding a New KMA to a Cluster. Verify the new KMA is
compatible with existing KMAs in the cluster.
2. Set the replication version to the highest value supported by all KMAs in the
cluster. Refer to Switch the Replication Version.
3. The Security Officer must use the OKM GUI to create the KMA entry in the
database (see Create a KMA). The KMA Name specified during the KMA
QuickStart process must match the KMA name used in the database.
Note:
Enter Key Split user names and passphrases carefully. Any errors cause
this process to fail with a non-specific error message. To limit information
exposed to an attacker, no feedback is given as to which Key Split user
name or passphrase is incorrect.
6. Once you have entered a sufficient number of Key Split user names and
passphrases to form a quorum. Enter a blank name to finish.
7. The KMA being added checks the firmware version against the existing versions in
the cluster. If it is not compatible, the new KMA displays an error and presents the
option to upgrade or downgrade the firmware. If you select "Yes", then the KMA
being added will:
• Grab the code from the existing KMA in the cluster
• Download the code for its own
• Install the code
This process takes about 25 to 30 minutes to complete. Once this process
completes, reboot the KMA. After the KMA comes back online from the reboot,
continue with the QuickStart program.
8. Consider accelerating initial updates to the new KMA. Review Accelerate Updates
to the New KMA in a Cluster before typing y at the prompt.
3-14
Chapter 3
Add a KMA to an Existing Cluster
9. You will see This KMA has joined the Cluster. Press Enter to exit. The QuickStart
program terminates and a login prompt is displayed (refer to Log into the KMA ). The
KMA now has the minimum system configuration that is required to communicate with the
OKM Manager.
10. Use the OKM Manager to connect to and configure the cluster. For procedures, refer to
Configure the Cluster .
11. The OKM cluster begins to propagate information to the newly added KMA. This causes
the new KMA to be very busy until it has caught up with the existing KMAs in the cluster.
The other KMAs are also busy. You can observe this activity from the OKM Manager by
viewing the KMAs as described by View and Modify KMA Settings.
12. Observe the Replication Lag Size value of the new KMA. Initially, this value is high.
Periodically refresh the information displayed in this panel by pulling down the View menu
and selecting Refresh or by pressing the F5 key. Once the Replication Lag Size value of
this KMA drops to a similar value of other KMAs in the cluster, then you can unlock the
KMA as described by Lock/Unlock the KMA.
13. The KMA remains locked after it has been added to the cluster. Wait until the KMA has
been synchronized (that is, until it has "caught up" with other KMAs in the cluster) before
you unlock it. Do not add another KMA to the cluster until you unlock the just-added
KMA.
3-15
Chapter 3
Restore a Cluster from a Backup
Later, the newly joined KMA automatically replicates any data that is not in the backup.
If an error occurs during this process, QuickStart displays the above prompt again (in
case the error is due to a temporary condition). QuickStart also displays the above
prompt again if the KMA cannot find a peer KMA that has a cached backup.
However, if more than 5 minutes has elapsed since the first time the above prompt
was displayed, then QuickStart displays the following message and no longer displays
the above prompt:
Failed to accelerate initial updates on this KMA after 300 seconds.
This KMA will gradually be updated with information from other KMAs.
Note:
Oracle recommends you specify a new Security Officer name that did not
exist in the OKM cluster when the last backup was performed. Enter a
temporary restore Security Officer user ID (for example, RestoreSO)
instead of the Security Officer user ID that existed before the restore.
If you specify an existing Security Officer name and provide a different
passphrase, the old passphrase is overwritten. If you specify an existing
Security Officer name and other roles were added to that user before the
last backup was performed, these other roles are no longer assigned to
this User.
3. (Optional)— At the prompt, provide the quorum login user ID and password.
3-16
Chapter 3
Restore a Cluster from a Backup
If you choose to define initial quorum user credentials in QuickStart, you can enter a
quorum login name and passphrase at this time so that the restore operation from the
OKM Manager GUI is set to pending. Quorum members can then use this login and
passphrase later to log in to the OKM Manager GUI and enter their credentials to
approve the restore (see Restore a Backup).
If you do not enter a quorum login user ID here, the only user that exists at the end of
QuickStart is the Security Officer created above. In this case, all Key Split Credentials
must be entered at once for the restore to occur.
4. Proceed to Set Time Information.
3-17
4
Install OKM Manager
OKM Manager is a client application installed on your workstation used to configure, control,
and monitor KMAs. To install OKM manager, first uninstall all previous versions, then
download and launch the installation wizard.
• Supported Platforms for OKM Manager
• Uninstall Previous Versions of OKM Manager
• Download the OKM Installer
• Launch the OKM Installer
• Complete the OKM Installation Wizard
• Launch OKM Manager
4-1
Chapter 4
Uninstall Previous Versions of OKM Manager
Note:
Uninstallation will not remove your connection profiles.
Note:
Uninstallation will not remove your connection profiles.
4-2
Chapter 4
Download the OKM Installer
4-3
Chapter 4
Complete the OKM Installation Wizard
Note:
If you invoke the installer on one Solaris system and want it to be
displayed on another Solaris system, set your DISPLAY environment
variable to identify the system on which it should be displayed.
On the display system, first run the xhost(1) utility to allow access from
the system from which you invoke the installer.
For example, on the system (named "hosta") where you wish to display
the installer, enter:
xhost +
4-4
5
Configure the Cluster
Use this list to configure the cluster. Follow the procedures referenced and then return to the
list for the next step.
• Verify you have the correct version of OKM Manager installed.
– Do not use older OKM GUIs (OKM 3.2 or earlier) to connect to KMAs running OKM
3.3 or later. You must use the OKM 3.3.2 GUI to upgrade a KMA to OKM 3.3.2. See
Install OKM Manager .
• Connect to the cluster — see Connect to a KMA
• Review security parameters — see Review and Modify the Cluster Security Parameters
• Create a user — Create a User
• Login to the OKM manager with the new user
• Create key policies — see Create a Key Policy
• Create key groups — see Create a Key Group
• Create agents and define a default key group for each agent — see Create an Agent
• Backup core security — see Create a Core Security Backup
• Create a backup — see Create a Database Backup
• Create KMAs — Create a KMA and Configure a KMA with QuickStart
• Join the KMA to the cluster — Add a KMA to an Existing Cluster
• Enroll agents — Enroll Agents
Connect to a KMA
Connect to a KMA to use the OKM Manager to monitor or modify the KMA's configuration.
Available to: All roles
1. Before connecting to a KMA, verify at least one cluster profile exists and that a user has
been created and enabled on the KMA. If you have not yet created a cluster profile, see
Create a Cluster Profile.
2. From the System menu of OKM Manager, select Connect (or click Connect in the tool
bar).
3. In the Connect to Cluster dialog, enter the following:
• User ID — the name of the user who will connect to specified KMA. Or, if this is the
first time that you are connecting to the KMA after the initial QuickStart process, enter
the name of the Security Officer created during QuickStart.
• Passphrase — the passphrase for the selected user.
• Cluster Name — the cluster to connect to.
5-1
Chapter 5
Connect to a KMA
• Member KMAs — the KMA to connect to within that cluster. If a KMA joined
the cluster after you connected to that cluster, that KMA will not appear in the
Member KMAs list. To update the list, enter the user name and passphrase,
choose a cluster profile, and click Refresh KMAs.
• IP Preference — IPv4 only, IPv6 only, or IPv6 preferred.
4. Click Connect.
If the connection is successful, the Status bar of the OKM Manager GUI displays
the user name and alias, the KMA's connection status (Connected), the KMA's IP
address.
5. You can now use the OKM Manager to perform various operations.
Note:
Depending on the role assignment, the tasks in the KMA Management
Operations Tree pane differ.
5-2
Chapter 5
Review and Modify the Cluster Security Parameters
Security Parameters
These parameters are selected when modifying security for the cluster.
Retention-related Fields
For the following six retention-related fields, there is a single audit log that resides in the
largest file system in the KMA. The main reason for adjusting these parameters is to control
how many audit log entries are returned in queries you issue from the Audit Event List menu
(see View and Export Audit Logs). The KMA truncates (removes) old audit log entries based
on the limit and lifetime of their retention term. For example, Short Term Audit Log entries are
typically truncated more frequently than Medium Term Audit Log entries; Medium Term Audit
Log entries are truncated more frequently than Long Term Audit Log entries.
• Short Term Retention Audit Log Size Limit — Displays the number of Short Term
Audit Log entries that are retained before they are truncated. The default is 10,000. The
minimum value is 1000; maximum value is 1,000,000.
• Short Term Retention Audit Log Lifetime — Displays the amount of time (in days) that
Short Term Audit Log entries are retained before they are truncated. The default is 7
days. The minimum value is 7 days; maximum value is 25,185 days (approximately 69
years).
• Medium Term Retention Audit Log Size Limit — Displays the number of Medium
Term Audit Log entries that are retained before they are truncated. The default is
100,000. The minimum value is 1000; maximum value is 1,000,000.
• Medium Term Retention Audit Log Lifetime — Displays the amount of time (in days)
that Medium Term Audit Log entries are retained before they are truncated. The default
is 90 days. The minimum value is 7 days; maximum value is 25,185 days.
• Long Term Retention Audit Log Size Limit — Displays the number of Long Term Audit
Log entries that are retained before they are truncated. The default is 1,000,000. The
minimum value is 1000; maximum value is 1,000,000.
• Long Term Retention Audit Log Lifetime — Displays the amount of time (in days) that
Long Term Audit Log entries are retained before they are truncated. The default is 730
days. The minimum value is 7 days; maximum value is 25,185 days.
5-3
Chapter 5
Review and Modify the Cluster Security Parameters
5-4
Chapter 5
Enroll Agents
Note:
If the current Replication Version is 8 or 9, there may be KMS 2.0.x KMAs in the
cluster that will not be capable of supporting the FIPS protocols for agent and
transfer partner communication. KMAs running KMS 2.1 or higher support the FIPS
protocols for agent and transfer partner communication even when the current
Replication Version is 8 or 9. In this case, exports to transfer partner will be done
only in the "v2.0" format because the export format of transfer partners will be set
to "Default".
If this value is set to "On", then the OKM cluster allows communications involving keys with
entities outside the cluster only in FIPS compliant modes:
• The OKM cluster accepts key requests from agents using only the FIPS 2.1 protocol.
• Keys from a KMS 1.x system cannot be imported into the OKM cluster because the KMS
1.x key export file is not FIPS compliant.
• The OKM cluster allows the export and import of "v2.1 (FIPS)" format key transfer files
only.
Note:
For the keys in the OKM cluster to be FIPS compliant, all entities that receive keys
from the cluster must handle the keys in a FIPS-compliant manner. Agents that
receive keys must handle these keys in a FIPS-compliant manner when using
them to process data. Key transfer partners that receive keys should also be
operating with the FIPS Mode Only security parameter set to "On" in their cluster to
ensure that exported keys maintain FIPS compliance. A key transfer partner can
send and receive "v2.1 (FIPS)" format key transfer files with the FIPS Mode Only
set to "Off".
See the Export Format parameter in View and Modify the Transfer Partner List for more
information.
Enroll Agents
Enroll agents after you have configured the cluster.
When you enroll an agent, you provide its Agent ID, its passphrase, and an network address
(IP address or host name) of one of the KMAs. The encryption endpoint associated with this
agent can then use this OKM cluster.The procedure to enroll an agent is determined by the
type of encryption endpoint associated with it:
• Tape Drives - Use the Virtual Operator Panel (VOP) to connect to a tape drive and then
to enroll the agent associated with it (see the VOP documentation for instructions). With
5-5
Chapter 5
Enroll Agents
guidance from your Oracle service representative, enroll each tape drive agent.
See Enroll Tape Drives .
• Oracle Database Servers - Agents associated with Oracle Database servers are
enrolled when these Oracle Database servers are configured to use OKM (see
Advanced Security Transparent Data Encryption (TDE)).
• Oracle Solaris ZFS Filesystems - Agents associated with Oracle Solaris ZFS
filesystems are enrolled when these ZFS filesystems are configured to use OKM
(see Solaris ZFS Encryption ).
• Oracle ZFS Storage Appliances - Agents associated with Oracle ZFS Storage
Appliances are enrolled when these ZFS Storage Appliances are configured to
use OKM. This procedure is described in Oracle ZFS Storage Appliances
documentation.
• Java Applications that use the OKM JCE Provider - Agents associated with
Java applications that use the OKM JCE Provider are enrolled when the OKM JCE
Provider is configured to use OKM. This procedure is described in the OKM JCE
Provider documentation.
See also: Agents (Encryption Endpoints).
Agent Type
The Agent Type can be a tape drive type (such as IBM LTO-7) or some other type of
agent (such as ZFSSA, PKCS#11 application, Java application). The IP address is
needed for tape drives when an Oracle service rep goes to configure them, and is
useful when enrolling other types of agents.
Roaming
This attribute shows the opposite value of the Agent's One Time Passphrase attribute.
For example, tape drive agents are not roaming agents, therefore the One Time
Passphrase attribute should be set to True for these agents.
5-6
6
Enroll Tape Drives
Enroll tape drives to allow them to retrieve keys used to read and write encrypted data.
• Tape Drive Enrollment Process Overview
• Supported Tape Drives and Required Firmware Levels
• Gather Information about the Tape Drives
• Obtain the T10000 Encryption Enablement Drive Data (Installer Task)
• Activate the Tape Drives (Installer Task)
• Enroll the Tape Drives (Customer Task)
• Assign Key Groups for Each Tape Drive (Customer Task)
• Switch Encryption On and Off
• Use Tokens to Transfer Encryption Keys
• Rebuild the Media Information Region for T10000 Drives
6-1
Chapter 6
Supported Tape Drives and Required Firmware Levels
6-2
Chapter 6
Gather Information about the Tape Drives
Caution:
The adapter cards contain ESD-sensitive components. Improper handling could
result in damage to these components. Make sure to follow proper ESD precautions
and procedures.
6-3
Chapter 6
Obtain the T10000 Encryption Enablement Drive Data (Installer Task)
• Does the customer want this drive to remain in encryption mode? Or do they want
the ability to switch encryption on and off?
6-4
Chapter 6
Activate the Tape Drives (Installer Task)
8. Continue with this process until you obtain all the drive data files for each tape drive you
are going to enable.
If you open the drive data file, using WordPad for example, you can see and verify the
drive serial number, enablement key, and crypto serial number (CSN). For example:
03B90866E66E1404C596FA0628B6335F435BB43302583AFDB4B121A6CB2C8E52
000160
02531002001232
Under crypto_drvs are the folders for each tape drive using the serial numbers. In each
serial number folder is the drive data file for that specific tape drive.
6-5
Chapter 6
Enroll the Tape Drives (Customer Task)
When enrolling HP LTO-4 and IBM LTO tape drives into the OKM, you are
enrolling the adapter card, not the actual tape drive. Therefore replacing the drive
does not require re-enrollment, but replacing the adapter card or drive tray with a
new adapter card does require re-enrollment.
Note:
For HP LTO-5 and LTO-6 tape drives, the ethernet port is integrated into
the drive.
6-6
Chapter 6
Assign Key Groups for Each Tape Drive (Customer Task)
Note:
The Agent must already be created with a passphrase assigned in the OKM
before you can enroll the drive.
See "Enroll Drive" in the "Using LTO VOP" chapter of the Oracle Virtual Operator Panel
User's Guide.
If you were to unenroll the Agent in situations—such as when turning encryption off—
then you need to re-enroll the agent to turn encryption back on.
The same passphrase must be re-entered or the agent must be recreated in the OKM
before re-enrollment.
2. Enter the KMA Agent ID, KMA Service1IP Address, and Passphrase.
3. Click the Enroll button.
4. Click the Monitor Drive tab to observe the enroll process in the open display.
See "Monitor Drive" in the "Using LTO VOP" chapter of the Oracle Virtual Operator Panel
User's Guide.
5. Set the drive Online. Click the Online status indicator or click the Set Online button under
either the Enroll Drive or Configure Drive tab.
6. Proceed to the next drive.
Note:
You must set a default key group for an agent before that agent can allocate
keys. When an agent creates a key (assigns it to a data unit), the key is placed
into the agent's default key group.
4. To assign a default key group, select an agent and then click < Default Key Group.
1 The KMA has two network connections, Management and Service. Make sure you use the Service IP address and not
the Management IP address.
6-7
Chapter 6
Switch Encryption On and Off
Note:
There is no special process to rebuild a MIR for the type of T10000 tape
drive (A or B, and encryption-capable or unencrypted). The rebuild MIR
process is an offline process that maps data and defects on the tape and
does not care if the data is encrypted or not.
6-8
Chapter 6
Rebuild the Media Information Region for T10000 Drives
1. Make sure drive is unloaded before activating the Build MIR utility. Rebuild MIR flashes
on the operator panel while the MIR is rebuilding.
2. Approximate time for a full tape Build MIR varies by the cartridge type:
• Standard T1 Data cartridge is approximately 120 minutes.
• Sport T1 Data cartridge is approximately 48 minutes.
3. If a CHKxxxx appears, see the FSC Dictionary for information.
4. Connect a tape drive to the VOP.
5. Use the Menu and Select buttons to navigate to the utility:
• Press Menu to bypass
• Press Select to activate.
6. When Ld Cust Tp appears, insert the write-enabled data cartridge with the invalid MIR.
With encryption-capable tape drives, a series of messages may appear several times
until the rebuild MIR operation continues. Examples of these messages include:
KMS2.0: my_tcp_connect select returned 0 err=236(op now in progress)
KMS2.0: AUDIT_CLIENT_GET_CLUSTER_Information_SOAP_ERROR
KMS2.0: All drives keys turned off
After these messages occur, the Rebuild MIR starts.
7. When the MIR is rebuilt, the cartridge unloads. Remove the cartridge.
8. Insert another write-enabled data cartridge requiring a MIR rebuild; or Press Menu to exit
the build MIR submenu.
6-9
7
Basic OKM GUI Operations
Basic OKM GUI operations are tasks commonly completed by any user and apply to
numerous GUI tasks.
• Disconnect from the KMA
• Access Online Help
• Filter Lists
• Export a List as a Text File (Save Report)
• Navigate OKM Manager with the Keyboard
• Specify OKM Manager Configuration Settings
Filter Lists
Apply filtering to lists to view a subset of the data.
1. From a list within OKM Manager (such as KMAs, Users, and so on), use the filter drop-
down menus to select a criteria, and then entering a value into the field. Click Use to
apply the filter.
2. Click a column name to sort by the attribute.
3. To clear the filter, click Reset.
7-1
Chapter 7
Navigate OKM Manager with the Keyboard
1. From any list screen within OKM manager, go to the View menu and then select
Save Report... (or press Ctrl-S).
2. Click Start to initiate the export. If you have filtered the entries list, only those
entries are exported.
7-2
Chapter 7
Specify OKM Manager Configuration Settings
Note:
The options selected are stored in the Windows Registry or in "~/.KMS
Manager" for other platforms (where ~ is the user's home directory). The
Windows Registry key for these values is "My
Computer\HKEY_CURRENT_USER\Software\Sun Microsystems\KMS Manager."
2. Modify the following parameters, as required, and click the Save button.
Communication Timeout — Type a timeout period (in seconds) for communications
with the connected KMA. If the KMA does not respond within the timeout value, the OKM
Manager gives up on the communication. The minimum value is 1; the maximum value is
60. The default is 15.
Query Page Size — Type the maximum number of items to display on a screen, dialog,
or tab on a dialog that displays a list of items. Paging can be used to view a list longer
than this limit. The minimum value is 1; the maximum value is 1000. The default is 20.
Display Dates in Local Time Zone — Select this check box to display all dates and
times in the local machine's time zone (i.e., where the OKM Manager is running), rather
than UTC. The default is selected. The following confirmation message is displayed.
Display Tool Tips on List Panels — Select this check box if you want to see a tool tip
when you position the cursor over an item. This is the default.
Zone ID — If your KMAs are configured to have IPv6 addresses and if you want to
connect to one of them using an IPv6 link-local address (that is, one that begins with
"fe80"), then select a Zone ID to use when connecting to that link-local address. See IPv6
Addresses with Zone IDs for more information.
Note:
You must enter a Zone ID whenever you specify a link-local address (that is, an
IPv6 address that begins with "fe80"). You can specify a Zone ID by appending it to
the end of an IPv6 address, following a percent sign (%).
1. Display a command prompt window and determine which Zone IDs are available on your
Windows system.
netsh interface ipv6 show interface
The Zone IDs appear in the Idx column in the output of this command. Look for entries
that show a State of "Connected."
2. Use the ping command to confirm network connectivity using one of these Zone IDs. For
example:
ping fe80::216:36ff:fed5:fba2%4
3. Before you open the Connect dialog in the OKM Manager GUI, display the Options dialog
and select the appropriate Zone ID.
7-3
Chapter 7
Specify OKM Manager Configuration Settings
4. Click Save.
7-4
8
Users and Roles
OKM manager limits access to certain functions based on the user and role. The security
officer manages and creates users.
• Change Your Passphrase
• View a List of Users
• Create a User
• Modify a User's Details and Set the User's Passphrase
• Delete a User
• View Roles and Valid Operations
Passphrase Requirements
Passphrases for Agents, KMAs, OKM users, and key split users must meet minimum
requirements.
• Length between 8 and 64 characters (to modify the minimum length requirement for
passphrases, see Review and Modify the Cluster Security Parameters)
• Must not contain the identifier or name of this agent, KMA, or user.
• Must contain three of the four character classes: uppercase, lowercase, numeric, or
special characters.
• Can contain the following special characters:
~ ! @ # $ % ^ & * ( ) - _ = + [ ] { } \ | ; : ' " < > , . / ?
8-1
Chapter 8
Create a User
Create a User
Create a user with a specific role to provide someone access to OKM Manager.
Available to: Security Officer (requires a quorum)
1. From the System Management menu, select User List. Click Create...
2. On the General tab, enter the following:
• User ID — Uniquely identifies the user. Can be between 1 and 64 (inclusive)
characters.
• Description — Describes the user. This value can be between 1 and 64
(inclusive) characters.
• Roles — The roles you want the user to perform.
Note:
The Quorum Member check box is disabled (grayed out) if the KMA
currently runs KMS 2.1 or earlier or if the replication version of the OKM
cluster is currently set to 10 or lower.
3. Click the Passphrase tab and enter the passphrase. Confirm the passphrase
(retype the same passphrase). The phrase must meet the requirements listed in
Passphrase Requirements.
4. Creating a user requires a quorum. Within the Key Split Quorum Authentication
dialog, the quorum must type their usernames and passphrases to authenticate
the operation. See Quorum Authentication for more information.
5. Record User Information to keep track of OKM users.
Note:
The currently logged-in Security Officers cannot modify their own records.
8-2
Chapter 8
Delete a User
1. From the System Management menu, select User List. Double-click a user (or highlight
a user and click the Details...).
2. On the General tab, you can modify the Description, Roles, and Enabled Flag.
3. On the Passphrase tab. You can change the user's passphrase. The phrase must meet
the requirements listed in Passphrase Requirements.
4. Click Save.
5. If you added user roles or changed the passphrase, within the Key Split Quorum
Authentication dialog, the quorum must type their usernames and passphrases to
authenticate the operation. See Quorum Authentication for more information.
6. Notify the user that their information has changed.
Delete a User
Delete a user to remove them from OKM Manager. Users cannot delete themselves.
Available to: Security Officer
1. From the System Management menu, select User List. Select the user you want to
delete and click Delete.
2. Click Yes to confirm.
Available Roles
Each role determines which functions the user can perform. A user can have more than one
role.
• Security Officer – manages security settings, users, sites, and transfer partners
• Compliance Officer – manages key policies and key groups and determines which
agents and transfer partners can use key groups
• Operator – manages agents, data units, and keys
• Backup Operator – performs backups
• Auditor – views information about the OKM cluster
• Quorum Member – views and approves pending quorum operations.
8-3
Chapter 8
View Roles and Valid Operations
8-4
Chapter 8
View Roles and Valid Operations
8-5
Chapter 8
View Roles and Valid Operations
8-6
Chapter 8
View Roles and Valid Operations
8-7
9
Monitor KMAs
Use SNMP, HMP, and OKM Manager logs to monitor KMAs.
• Configure SNMP
• Configure the Hardware Management Pack (HMP)
• Display the Current Load
• View and Export Audit Logs
• Create a System Dump
• Send Messages to Remote Syslog Servers
Configure SNMP
Use SNMP to monitor KMAs in the cluster.
KMAs generate SNMP information for users who have configured an SNMP agent in the
network and defined SNMP Managers in the OKM Manager GUI.
• SNMP Protocol Versions
• SNMP MIB Data
• View SNMP Managers for a KMA
• Create a New SNMP Manager
• Modify an SNMP Manager's Details
• Delete an SNMP Manager
9-1
Chapter 9
Configure SNMP
9-2
Chapter 9
Configure the Hardware Management Pack (HMP)
9-3
Chapter 9
Configure the Hardware Management Pack (HMP)
HMP Prerequisites
Before enabling HMP, verify all prerequisites are met.
• (Recommended) Configure the ILOM identification information using the ILOM BUI
or CLI. The KMA SNMP daemon logs a warning when these fields are not
configured. The subsequent SNMP notifications will contain this information and
aid with troubleshooting. The recommended fields to configure are:
– SP Hostname
– SP System Identifier
– SP System Contact
– SP System Location
– Local Host Interconnect
• The Local Host Interconnect settings in Oracle ILOM must be in the Host Managed
state (this is the default state). To verify using the ILOM user interface, navigate to
ILOM Administration, and then select the Connectivity panel. On the Network tab's
page, verify the Local Host Interconnect Status is "Host-Managed" and an IP
address is shown, (typically)169.254.182.76.
• The ILOM Administration and Notifications must not have an alert rule configured
for Alert ID 15, as this will be used when configuring HMP to have faults
forwarded. From the ILOM BUI, navigate to ILOM Administration, then select the
9-4
Chapter 9
Display the Current Load
Notifications panel. On the Alerts tab, check Alert ID 15. From the ILOM CLI,
"show /SP/alertmgmt/rules/15".
• IPMI must be enabled in the ILOM. For the ILOM BUI see ILOM
Administration:ManagementAccess and the IPMI tab.
Enable/Disable HMP
Enable or disable HMP using OKM Manager.
Available to: Security Officer
1. Select Hardware Management Pack on the Local Configuration menu.
2. Within the Hardware Management Pack panel, click Enable to configure HMP or Disable
to unconfigure it. Click Test to issue a test fault.
9-5
Chapter 9
Create a System Dump
• Condition - Indicates whether the operation was successful or not. Errors are
highlighted in red. Warnings are highlighted in yellow. If you hover the cursor over
an error message, a more detailed description of the error is displayed. If the
Condition value is Server Busy, the KMA that generated the event also issues an
SNMP inform message with the event details.
• Event Message - Detailed information of the Audit Event entry.
• Entity ID - If this Audit Event is generated in response to an operation requested
by a user, agent, or peer KMA, then this field displays the user-specified identifier
of that entity. Otherwise, this field is blank.
• Entity Network Address - If this Audit Event is generated in response to an
operation requested by a user, agent, or peer KMA, then this field displays the
network address of that entity. Otherwise, this field is blank.
• KMA ID - The name of the KMA that generated this audit event. This KMA name is
the user-supplied identifier that distinguishes each KMA in a cluster.
• KMA Name - The user-supplied identifier that distinguishes each Appliance in a
cluster.
• Class - Identifies the class of operations to which the Audit Event entry belongs. If
the Class value is Security Violation, the KMA that generated the event also issues
an SNMP inform message with the event details.
• Retention Term - The defined length of time that the Audit Event record is
retained. Possible values are:
– Long Term — Event records that must be stored for a lengthy time period.
– Medium Term — Event records that must be stored for a medium length time
period.
– Short Term — Event records that must be stored for a short time period.
• Audit Log Entry ID - A system-generated unique identifier that distinguishes each
type of Audit Event entry.
• Audit Log ID - A system-generated unique identifier that distinguishes each Audit
Event entry.
9-6
Chapter 9
Send Messages to Remote Syslog Servers
9-7
Chapter 9
Send Messages to Remote Syslog Servers
Note:
This CA certificate is a root CA certificate.
4. The Security Officer must first acquire a certificate that was issued by a Certificate
Authority (CA).
5. The Security Officer must then provide this client (KMA) certificate when enabling
the remote syslog feature on that KMA.
6. The administrator of the remote syslog server must obtain the certificate of the
Certificate Authority that issued this client (KMA) certificate and then install this CA
certificate on the remote syslog server.
Note:
Certificate and private key files must be in PEM format.
• Optionally, enter a port number on which the remote syslog service on the
remote syslog server is listening. Port 514 is used by default for TCP
Unencrypted, and port 6514 is used by default for TLS.
• Use the check box to select whether the remote syslog server is enabled.
4. Click Save.
9-8
Chapter 9
Send Messages to Remote Syslog Servers
9-9
10
Backups
Create and use backups to restore the cluster following a disaster.
• What is a Core Security Backup?
• What is a Database Backup?
• View Backup File Information
• Create a Core Security Backup
• Create a Database Backup
• Restore a Backup
• Destroy a Backup
10-1
Chapter 10
Considerations When Performing Backups and Key Sharing
• If you routinely delete keys for policy or compliance reasons, the deleted keys can
be recovered from prior backups.
• Make two identical copies to protect against backup media failure. This scheme
also ensures another key was not issued during the backup, making the two
copies different.
• Maintain offsite copies of the Core Security and Database backups.
10-2
Chapter 10
Create a Core Security Backup
Caution:
Carefully protect core security backup files. Any core security backup file can be
used with any backup file/backup key file pair, therefore even old core security
backup files remain useful.
10-3
Chapter 10
Create a Database Backup
Restore a Backup
If all KMAs in a cluster have failed, upload and restore a backup file and backup key
file to the KMA.
Available to: Security Officer (requires a quorum)
1. Before performing this procedures, ensure that you have completed the QuickStart
and selected the Restore a Cluster from a Backup option.
2. Best Practice: Log in to OKM Manager as the temporary Security Officer
established in Create Security Officer and Provide Quorum Login of the
QuickStart.
3. In the left navigation tree, expand Secure Information Management, and then
select Backup List. Click Restore...
4. Select a backup key file and backup file. These must match (meaning were
created at the same time).
5. Select a core security backup. This can be older or newer than the backup key file
and backup file. You can use any Core Security backup file with any backup key
file and backup file.
6. Click Start.
7. Enter the Key Split Credentials. These must be Key Split Credential users that
were in effect when the Core Security Backup was created.
Once the restore is complete, the Key Split Credentials that were in effect when
the backup (not the Core Security Backup) was completed, will be restored.
10-4
Chapter 10
Destroy a Backup
Note:
Enter Key Split user names and passphrases carefully. Any errors will cause
this process to fail with a non-specific error message. To limit information
exposed to an attacker, no feedback is given as to which Key Split user name
or passphrase is incorrect.
Destroy a Backup
Destroy a backup to ensure that it cannot be used in the future.
Available to: Compliance Officer (view only), Backup Operator
1. Before proceeding, ensure that you have destroyed all copies of the corresponding
backup key file.
2. From the Backups menu, select Backup List.
3. Select a backup, and then click Confirm Destruction.
4. If you are certain that all copies of the corresponding backup key file have been manually
destroyed, click Destroy.
10-5
11
Keys, Key Policies, and Key Groups
Understand the difference between keys, key policies, and key groups to properly configure
and manage OKM.
Keys are the actual key values (key material) and their associated metadata. Each KMA
creates 1000 keys (default) when created. This may vary during installation. Each KMA
controls and assigns its own keys. After issuing 10 keys the KMA creates 10 keys to
replenish them. Keys are then replicated to all KMAs in the OKM.
Key policies define parameters that govern keys. This includes lifecycle parameters (such as
encryption period and cryptoperiod) and import/export parameters (for example, import
allowed, export allowed.)
Key groups associate keys and key policies. Each key group has a key policy and is
assigned to agents. Agents are allowed to retrieve only the keys that are assigned to one of
the agent's allowed key groups. Agents also have a default key group. When an agent
creates a key (assigns it to a data unit), the key is placed into the agent's default key group.
Note:
For the system to function, you must define at least one key policy and one key
group (assigned as the default key group) for all agents.
11-1
Chapter 11
About Key Lifecycles
Pre-activation
This state indicates that the key has generated but is not yet available for use. Within
the pre-activation state, the key can take two further states:
• Generated — Indicates a key that has been created on one KMA in a OKM
cluster. It remains generated until it has been replicated to at least one other KMA
in a multi-OKM cluster. In a cluster with only a single KMA, a key must be
recorded in at least one backup to transition out of the generated state.
• Ready — A ready state indicates that the key has been protected against loss by
replication or a backup. A ready key is available for assignment. The "replicated"
transition occurs when the key is replicated or (for a single OKM cluster) backed
up.
Active
This state indicates that the key may be used to protect information (encrypt) or to
process previously protected information (decrypt) NIST states that an active key may
be designated to protect only, process only, or protect and process. Further, it
specifically states that for symmetric data encryption keys, a key may be used for
some time period to protect and process information and once this time period
expires, the key may continue to be used for processing only.
Within the active state, the OKM adds two substates. These states are described in
NIST, but are not specifically identified as states.
• Protect-and-process — A key in this state can be used for both encryption and
decryption. A key is placed into this state when it is assigned. The assignment is
done when an encryption agent requests a new key to be created.
• Process only — A key in this state can be used for decryption but not encryption.
When an agent determines that none of the keys available to it for a specific data
unit that is being read or written are in the protect-and-process state, it should
create a new key.
Keys move from the protect-and-process state to the process only state when the
encryption period for the key expires.
Deactivated
This state indicates that the key has passed its cryptoperiod but may still be needed
to process (decrypt) information. NIST specifically states that keys in this state may
be used to process data.
The NIST guidelines state that if post-operational keys, including deactivated and
compromised keys, need to remain accessible, they should be archived. This is a key
11-2
Chapter 11
About Key Lifecycles
recovery process that allows keys to be recalled from an archive and made available for use.
The OKM provides archives in the form of KMA backups but cannot recall a single key from
a backup. Therefore, the OKM retains post-operational phase keys in the OKM cluster and
delivers them upon request from an agent.
Compromised
Keys are in the compromised state when they are released to or discovered by an
unauthorized entity. Compromised keys should not be used to protect information, but may
be used to process information.
Destroyed/Destroyed Compromised
Destroyed and Destroyed Compromised keys (keys that are compromised before or after
destruction) no longer exist. However, information about the key may be retained. Key
material from destroyed keys is removed from the OKM cluster. Destroyed keys will not be
delivered to an agent.
Note:
The only way to destroy a key is through the GUI or the management API.
The NIST guidelines do not provide any basis for destroying keys based on time.
Within the Destroyed and Destroyed Compromised states, the OKM defines two substates,
incomplete and complete. These states are created because the OKM does not control the
backups that it creates. A customer administrator must inform the OKM when a backup has
been destroyed. Only after all backups have been destroyed can a key be considered truly
destroyed.
• Incomplete — An Incomplete substate indicates that at least one backup still exists that
contains the destroyed key. In this substate, the key does not exist in any KMA in the
OKM cluster. Keys in this state cannot be delivered to agents.
• Complete — A Complete substate indicates that all backups containing the key have
been destroyed. The key does not exist in any KMA, nor in any backup. Strictly
speaking, backups that contain the key may well still exist. Although the OKM identifies
the backups as destroyed, it is the responsibility of the user to ensure these backups
have actually been destroyed.
It is worth noting again that the "destroyed" transition occurs only as the result of an
administrative command. Further, keys may still be delivered to an encryption agent
when the key is in the post-operational phase (Deactivated and Compromised states).
This interpretation is consistent with NIST's descriptions for the post-operational phase.
The NIST guidelines specify that a post-operational key should be destroyed when it is
"no longer needed." We believe that only you can determine when a key is "no longer
needed," so only an external entity can initiate the destroyed transition.
In diagram below, states and transitions shown in red are added by the OKM. When
examining keys in the OKM Manager, only the innermost state is listed.
11-3
Chapter 11
Manage Key Policies
11-4
Chapter 11
Manage Key Policies
11-5
Chapter 11
Manage Key Groups
11-6
Chapter 11
Manage Key Groups
Note:
You must set a default key group for an agent before that agent can allocate
keys. When an agent creates a key (assigns it to a data unit), the key is placed
into the agent's default key group.
4. To assign a default key group, select an agent and then click < Default Key Group.
11-7
Chapter 11
Manage Keys
Procedures:
1. Go to the KMS 1.2 system and export the keys into a file. Only keys exported from
KMS 1.2 systems can be imported. KMS 1.0 and 1.1 systems must be upgraded
to 1.2 before exporting keys.
2. From the Secure Information Management menu, select Import 1.0 Keys.
3. Select the Destination Key Group into which these keys will be imported.
4. Click Browse, and then locate the KMS 1.0 Key Export file.
5. Click Start to upload the KMS 1.0 keys file to the KMA. A new key is created for
each key the file contains. Each new key is associated with the key group you
selected.
Manage Keys
Keys are the actual key values (key material) and their associated metadata. The
compliance officer can change the key group association and compromise keys.
• View and Modify Key Information
• Compromise Keys
Compromise Keys
Compromise a key when it is no longer secure and should not be used.
Available to: Compliance Officer
1. From the Data Units menu, select Data Unit List.
2. Select a data unit to modify, and then click Details...
11-8
Chapter 11
Transfer Keys Between Clusters
11-9
Chapter 11
Transfer Keys Between Clusters
Software Version FIPS Mode Only— FIPS Mode Only— Export Format
— Importing KMA Exporting Cluster Importing Cluster
2.0.2 or lower Off N/A v2.0 or Default
2.0.2 or lower On N/A v2.0
2.1 or higher Off Off v2.1 (FIPS)
2.1 or higher On Off v2.1 (FIPS)
2.1 or higher Off On v2.1 (FIPS)
2.1 or higher On On v2.1 (FIPS) or
Default
– v2.0 —This transfer partner does not wrap keys when it exports them.
– v2.1 (FIPS) —This transfer partner wraps keys when it exports them.
– Default — Enables sharing keys between a cluster running KMS 2.1+ and
another cluster in which all KMAs run KMS 2.0.x. This value effectively
uses either "v2.0" or "v2.1 (FIPS)" behavior depending on the software
version of the KMA importing the keys and the settings of the "FIPS Mode
Only" security parameter on the exporting and importing OKM clusters.
"Default" allows you to alter the format of the transfer partner's transfer
files simply by changing the FIPS Mode Only security parameter instead
of editing the transfer partner's Export Format setting directly, which
requires a quorum.
• Flags - Enabled — When selected, this transfer partner can share keys.
• Flags - Allow Export To — When selected, you can export keys to the
transfer partner.
11-10
Chapter 11
Transfer Keys Between Clusters
• Flags - Allow Import From — When selected, you can import keys from this transfer
partner.
3. Complete the following on the Public Keys tab:
• New Public Key ID — Enter the Public Key ID provided to you by the transfer
partner.
• New Public Key — Enter the Public Key provided to you by the transfer partner.
• New Public Key Fingerprint — This read-only field shows the fingerprint, or hash
value, of the new Public Key. Verify this fingerprint with the Partner to ensure the
Public Key has not been tampered with, accidentally or deliberately, during
transmission.
4. As you enter the Public Key, the system computes the fingerprint. Communicate with the
partner cluster administrator using a different method than was used for the transfer of
the key itself.
Both administrators should look at their OKM and verify the fingerprint matches. A
mismatch indicates the key has been damaged or modified during the transfer.
5. If the fingerprint is correct, click Save.
6. Enter the Key Split Quorum Authentication. See Quorum Authentication for more
information.
11-11
Chapter 11
Transfer Keys Between Clusters
11-12
Chapter 11
Transfer Keys Between Clusters
11-13
Chapter 11
Transfer Keys Between Clusters
previous OKM release. It cannot, however, configure a pre-OKM 3.1 KMA Transfer
Partner using the longer key length.
• You must use the OKM 3.1 or later GUI to configure Transfer Partners on OKM
clusters where OKM 3.1 or later KMAs reside.
• You cannot configure Transfer Partners for key sharing between an OKM cluster
where OKM 3.1 or later KMAs reside and an OKM cluster where only OKM 2.5.3
(or lower) or OKM 3.0.2 (or lower) KMAs reside.
11-14
12
Sites, KMAs, Agents, and Data Units
Use OKM Manager to configure and control sites, KMAs, agents, and data units.
• Manage KMAs
• Manage Sites
• Manage Agents
• Manage Data Units
Manage KMAs
Each KMA is a server node within the cluster. Create, delete, update, and view KMAs.
• Create a KMA
• View and Modify KMA Settings
• Change a KMA Passphrase (Log the KMA Out of the Cluster)
• Delete a KMA
• Query KMA Performance
• Modify Key Pool Size
• Lock/Unlock the KMA
• Upgrade Software on a KMA
• Check the Replication Version of the KMA
• Switch the Replication Version
• View KMA Network Configuration Information
• View and Adjust the KMA Clock
• Check the Cryptographic Card
See also: Key Management Appliance.
Create a KMA
Create a KMA definition within OKM Manger before adding it to the cluster using QuickStart.
Available to: Security Officer (requires a quorum)
1. From the System Management menu, select KMA List. Click Create...
2. Enter the following within the General tab:
• KMA Name — Uniquely identifies the KMA in a cluster (can be between 1 and 64
characters).
• Description — Describes the KMA (can be between 1 and 64 characters).
• Site ID (optional) — The site that the KMA belongs to,
12-1
Chapter 12
Manage KMAs
3. Click the Passphrase tab, and then enter the passphrase for the user. See
Passphrase Requirements.
4. Click Save.
5. Creating a KMA requires a Quorum. Within the Key Split Quorum Authentication
dialog, the quorum must type their usernames and passphrases to authenticate
the operation. See Quorum Authentication for more information.
6. Run the QuickStart program on the KMA(s) you created so that they can join the
cluster. For procedures on joining a cluster, refer to Add a KMA to an Existing
Cluster.
12-2
Chapter 12
Manage KMAs
route to that KMA. If a default or static route is not defined, then other KMAs may be
shown as "Not Accessible."
• Response Time - Time (in milliseconds) the KMA takes to respond to a request on its
management network. This is typically a few hundred milliseconds. It can be larger if a
WAN connection exists between the local KMA and a remote KMA or if the
communications link between KMAs is busy.
• Replication Lag Size - Number of updates before replication takes place. This number
should be zero or a small value. Larger values indicate that replications are not
completing in a timely manner, the communications link between KMAs is down or busy,
or a remote KMA is down. This value will also be very large when a new KMA has just
been added to the cluster.
• Key Pool Ready - Percentage of unallocated keys that are ready.
• Key Pool Backed Up - Percentage of the Key Pool that has been backed up. N/A
indicates that the KMA cannot determine this value, because either the KMA runs down-
level software or it is currently using a lower Replication Version.
• Locked - If true, the KMA is locked. N/A indicates that the KMA cannot determine this
value, because either the KMA runs down-level software or it is currently using a lower
Replication Version.
• Enrolled - If true, the KMA has successfully been added or logged into the cluster. This
value is False when the KMA is first created and will change to True once the KMA has
logged into the cluster. It can also be False when the KMA passphrase is changed. Once
a KMA has logged in, the passphrase used to log in can no longer be used. The
passphrase must be changed before the KMA can log in to the cluster again.
• HSM Status - Status of the hardware security module (cryptographic card). Possible
values:
– Unknown The KMA is running a software release older than KMS 2.2.
– Inactive The KMA currently does not need to use the hardware security module,
typically because the KMA is locked.
– Software The hardware security module is not functional, and the KMA is using the
software provider to generate keys.
– Hardware The hardware security module is functional, and the KMA is using it to
generate keys.
– SW Error/HW Error The KMA encountered an error when it tried to query the status
of the software provider (SW Error) or the hardware security module (HW Error).
Note:
Normally, the hardware security module is functional (Hardware). However,
if the hardware security module becomes non-functional (Software) and the
FIPS Mode Only security parameter is set to Off (see Review and Modify
the Cluster Security Parameters), then the KMA switches to using the
software provider to generate keys.
If the hardware security module becomes non-functional and the FIPS Mode Only
security parameter is set to On, then the KMA cannot generate keys or return AES
wrapped key material to agents.
12-3
Chapter 12
Manage KMAs
Note:
If your KMA includes an nShield Solo cryptographic card, the
firmware level currently running on this card might be incorrect. See
Upgrade nShield Solo Firmware for information about how to
upgrade this firmware.
Delete a KMA
Delete a failed or decommissioned KMA to remove it from the cluster. The KMA must
be offline before deleting it.
Available to: Security Officer
1. Before deleting a KMA, take it offline using the Console "Shutdown KMA" function.
If you fail to do this, the KMA continues to function outside of the cluster and sends
"stale information" to agents and users.
2. From the System Management menu, select KMA List. Highlight the KMA you
want to delete, and then click Delete.
12-4
Chapter 12
Manage KMAs
12-5
Chapter 12
Manage KMAs
Note:
KMAs pre-generate keys so a key creation request from an agent does not
actually cause a key to be created on the KMA until the key pool maintainer
runs within the server. When the server is busy the key pool maintainer can
be delayed in its operations.
The total cluster key pool size must be large enough so that KMAs can hand out pre-
generated keys from their key pool during the backup windows. When the key pool
size is too small, KMAs can become drained of pre-generated keys and start returning
"no ready key" errors. Tape drives failover to other KMAs when this happens, adding
further disruption to the backup/key transfer window.
Administrators should observe the OKM backup window periodically as it will gradually
grow as the database gets larger. Adjust the key pool size when the backup window
exceeds a threshhold or if the key consumption rate grows due to changes in the
overall tape workload.
Note:
Oracle recommends disabling autonomous unlock for maximum security.
When disabled, the KMA remains locked and unable to service agents until a
quorum unlocks it.
12-6
Chapter 12
Manage KMAs
Version Requirements
Use a GUI release that matches the version you want to load on the KMA(s). Always use a
newer OKM GUI to activate a newer OKM software version on a KMA.
12-7
Chapter 12
Manage KMAs
For OKM 3.0 KMAs, the version string shows the following format: <OKM
release>-5.11-<OKM build>. For example, 3.0.0-5.11-2012.
Note:
The KMA restarts as part of the activate process. Since the KMA is
offline while it restarts, you may not want to activate KMAs
simultaneously in a cluster.
5. Software activation requires a quorum. Within the Key Split Quorum Authentication
dialog, the quorum must type their usernames and passphrases to authenticate
the operation. See Quorum Authentication for more information.
6. The Technical Support account is disabled on the upgraded KMAs, and the
accounts must be reenabled if needed.
12-8
Chapter 12
Manage KMAs
Perform the nShield HSM firmware update(y) or run OKM without an HSM(n)?
Several seconds later, the KMA displays a message when the firmware upgrade completes:
Note:
If the nShield firmware was not upgraded when the KMA was upgraded to OKM
3.3.3, you can upgrade it later by rebooting the KMA and performing these steps.
12-9
Chapter 12
Manage KMAs
1. In the left navigation menu, expand the Local Configuration menu, select
Software Upgrade.
2. View the version in the Current Replication Version column.
See also: Switch the Replication Version.
12-10
Chapter 12
Manage KMAs
12-11
Chapter 12
Manage Sites
Manage Sites
View, create, modify, and delete sites. A site is a physical location with at least one
KMA. Sites help agents recover from a KMA failure and load balance.
• Create a Site
• View and Modify a Site
• Delete a Site
Create a Site
Create a site to identify KMAs that reside at the same physical location. Sites help
agents to respond to KMA failures and load balance by connecting to local KMAs.
Available to: Security Officer
1. In the left navigation tree, expand System Management, and then select Site
List. Click Create...
2. Enter the following:
• Site ID — Uniquely identifies the site. This value can be between 1 and 64
characters.
• Description — Uniquely describes the site. This value can be between 1 and
64 characters.
3. Click Save.
4. Assign KMAs and agents to the Site ID (see View and Modify KMA Settings and
View and Modify Agents).
Delete a Site
Delete a site that is not assigned to any agents or KMAs.
Available to: Security Officer
1. If any agents or KMAs are specified to be at the site, you must assign them to a
different site before deleting.
2. In the left navigation tree, expand System Management, and then select Site
List.
12-12
Chapter 12
Manage Agents
Manage Agents
View, create, modify, delete, and assign agents. Agents are devices or applications that use
cryptographic keys from OKM to encrypt and decrypt data.
• Create an Agent
• View and Modify Agents
• Set an Agent's Passphrase
• Assign Key Groups to an Agent
• Delete Agents
Create an Agent
Create an agent to allow it to access the cluster.
Available to: Operator
1. From the Agents menu, select Agent List. Click Create...
2. On the General tab, complete the following:
• Agent ID — Uniquely identifies the agent (between 1 and 64 characters).
Note:
Agent IDs cannot be changed once created. If you replace the agent, you
can reuse the name. However, passphrases can only be used once. You
will need to give the agent a new passphrase.
12-13
Chapter 12
Manage Agents
4. Click Save.
5. Complete the agent-specific enrollment procedure using the agent-specific
interface. For example, for StorageTek drives, you must use the VOP (Virtual
Operator Panel) to complete the enrollment procedure.
Note:
Do not change the passphrase unless you believe it is compromised
(see Set an Agent's Passphrase for more info).
12-14
Chapter 12
Manage Agents
Delete Agents
Delete an agent you no longer want to access OKM.
Available to: Operator
1. From the Agents menu, select Agent List.
2. Select the agent you want to delete, and then click Delete.
3. Click Yes to confirm.
12-15
Chapter 12
Manage Data Units
process requests internally. They do not include transmission times over the
network or the amount of time required to establish an SSL connection. The
OKM cluster must use replication version 15 or later before request processing
times are available.
2. To display more information about an agent, select an agent and click Details... (or
double-click an agent).
Note:
If the Description field contains the string "PKCS#11v2.20," this represents
a special key used for Oracle Database Transparent Data Encryption
(TDE). Do not change this field. Doing so can alter the way OKM
interacts with TDE.
4. Click Save.
12-16
Chapter 12
Manage Data Units
value with a volser on an optical barcode or in an ANSI tape label. This value is not
used for StorageTek tape drives.
• Description - Describes the data unit.
• External Tag - Unique external tag for the data unit.
– For tapes that are in a StorageTek tape library, or tapes that have ANSI standard
labels, this field is the volser. If the tape is in a library and has an ANSI label, the
library volser (that is, optical bar code) is used if it differs from the volser contained in
the ANSI label. For tapes written in stand-alone drives without ANSI labels, this field
is blank.
– For data units written by LTO Gen 4 and Gen 5 tape drives, this field is padded on
the right with blanks to fill in 32 characters. It may be more convenient for you to use
the "Starts With ~" filter operator instead of the "Equals =" filter operator, so that you
do not have to add the blanks to pad the External Tag. For example, if you use the
"Starts With" filter, you could enter: "External Tag" ~ "ABCDEF". If you use the
"Equals" filter for the same example, you would need to enter: "External Tag" =
"ABCDEF " (padded to fill 32 characters).
• Create Date - Date and time when the data unit was created/registered.
• Exported - If true, the keys associated with this data unit have been exported.
• Imported - If true, the keys associated with this data unit have been imported.
• State - State of the data unit. Possible values are:
– No Key: Set when the data unit has been created, but has not yet had any keys
created.
– Readable: Set when the data unit has keys that allow at least some parts of the data
unit to be decrypted (read).
– Normal: Set when the data unit has keys that allow at least some parts of the data
unit to be decrypted (read). In addition, the data unit has at least one protect-and-
process state key that can be used to encrypt data. The data unit is therefore
writable.
– Needs Re-key: Set when the data unit does not have at least one protect-and-
process state key. Data should not be encrypted and written to this data unit until the
data unit is rekeyed and a new, active key is assigned to it. It is the responsibility of
the agent to avoid using a key that is not in protect-and-process state for encryption.
The data unit may have keys that are in process only, deactivated, or compromised
state. A key in any of these three states can be used for decryption.
– Shredded: Set when all of the keys for this data unit are destroyed. The data unit
cannot be read or written. However, a new key can be created for this data unit,
moving its state back to Normal.
12-17
Chapter 12
Manage Data Units
12-18
Chapter 12
Manage Data Units
– Ready — Set when the key has been protected against loss by replication or a
backup. A ready key is available for assignment.
– Protect and Process — Set when the key has been assigned when an encryption
agent requests a new key be created. A key in this state can be used for both
encryption and decryption.
– Process Only — Set when the key has been assigned but its encryption period has
expired. A key in this state can be used for decryption but not for encryption.
– Deactivated — Set when the key has passed its cryptoperiod but may still be
needed to process (decrypt) information.
– Compromised — Set when the key has been released to or discovered by an
unauthorized entity. A key in this state can be used for decryption but not for
encryption.
– Incompletely Destroyed — Set when the key has been destroyed but it still appears
in at least one backup.
– Completely Destroyed — Set when all of the backups in which the destroyed key
appears have been destroyed.
– Compromised and Incompletely Destroyed — Set when the compromised key still
appears in at least one backup.
– Compromised and Completely Destroyed — Set when all of the backups in which
the compromised key appears have been destroyed.
• Recovery Activated - Indicates whether the key has been linked to the data unit by a
recovery action.
– This condition occurs when a key is used for a data unit by one KMA in a OKM
cluster and then, due to a failure, the key is later requested for the data unit from a
different KMA. If the failure (such as a network outage) has prevented the allocation
of the key to the data from being propagated to the second KMA, the second KMA
creates the linkage to the data unit. Such a key is "recovery activated," and an
administrator may want to evaluate the system for KMA or network outages. Possible
values are True and False.
12-19
Chapter 12
Manage Data Units
reporting that a data unit does not exist in a particular backup when in fact it does.
Such a case is known as a "false negative" and seriously undermines compliance
requirements for data destruction. Unlike "false negatives," "false positives" do not
undermine compliance requirements for data destruction, hence the five minute
window.
1. From the Data Units menu, select Data Unit List. Click Key Counts.
2. By default, the display shows all data units associated with more than one key.
See Filter Lists to filter the list.
12-20
13
Quorum Authentication
A quorum is a set number of authenticators. Some operations require a sufficient number of
quorum users to enter their credentials. Requiring a quorum assures that no single person
can make a critical change.
• What Occurs If You Do Not Enter a Quorum
• Operations that Require a Quorum
• View and Modify the Key Split Configuration
• View Pending Operations
• Approve Pending Quorum Operations
• Delete Pending Quorum Operations
13-1
Chapter 13
View and Modify the Key Split Configuration
13-2
Chapter 13
Approve Pending Quorum Operations
13-3
14
OKM Console
OKM Console is a terminal text-based interface used to configure basic functions of the KMA.
The operating system automatically launches OKM Console when the KMA starts up. The
console cannot be terminated by a user. Depending on the roles that a user is assigned, the
options in the console differ. Before you can login to the console, the security officer must
create the user with OKM Manager. OKM Console uses the same user name and
passphrase as for OKM Manager.
• Log into the KMA
• User Role Menu Options
• OKM Console Functions
14-1
Chapter 14
User Role Menu Options
14-2
Chapter 14
OKM Console Functions
14-3
Chapter 14
OKM Console Functions
14-4
Chapter 14
OKM Console Functions
Caution:
Use this function carefully. KMAs communicate with each other using their
management network interface. Changing the IP address settings for the
management network interface of a KMA can affect the network connectivity
between the KMA and other KMAs.
For example, you have two KMAs not currently communicating with each other
(possibly due to a network outage or a change in the network environment). If you
change the management IP addresses on both of them, they might not be able to
communicate with each other after the network is repaired. In this case, try
changing the passphrase of one of these KMAs and then use the procedure for Log
KMA Back into Cluster .
14-5
Chapter 14
OKM Console Functions
Caution:
This function should be used carefully. KMAs typically communicate with
tape drives at the local site using their service network interface over a
private service network. This means that changing the IP address settings for
the service network interface of this KMA can affect the network connectivity
between this KMA and the tape drives.
Tape drives do not receive updated IP information immediately after you
update the service IP addresses on a KMA; they typically get update IP
information when a tape cartridge is mounted.
Consider the example where tape jobs run only at night and you change the
service IP addresses of all of the local KMAs during the day. In this case, the
tape drives might not be able to communicate with the KMAs. If this
happens, the drives must be re-enrolled with the OKM cluster. To avoid this,
you should change service IP addresses on one KMA at a time and then wait
for the tape drives to receive this change before proceeding to the next KMA.
14-6
Chapter 14
OKM Console Functions
7. Type y at the Are you sure that you want to commit these changes? [y/n]:
prompt.
1. Log into OKM console. At the Please enter your choice: prompt on the main menu,
select Set Acceptable TLS Versions and press Enter.
2. Select the TLS versions to enable, and then press Enter. Options include:
• 1 (TLSv1.0 and higher)
• 2 (TLSv1.1 and higher)
• 3 (TLSv1.2 and higher)
• 4 (TLSv1.3 and higher)
14-7
Chapter 14
OKM Console Functions
1. Log into OKM console. At the Please enter your choice: prompt on the main
menu, select Set DNS Settings and press Enter.
2. Enter the DNS domain name at the Please enter the DNS Domain (blank to
unconfigure DNS): prompt.
3. Enter the DNS server IP address at the Please enter DNS Server IP address
prompt. You can enter up to three IP addresses.
4. Press Enter, without specifying an IP address, to finish.
Caution:
Use this function carefully. Removing a KMA from the cluster can affect the
performance load on other KMAs.
14-8
Chapter 14
OKM Console Functions
• The KMA does not wait for replications to be completed. Any replications that did not
complete before the shutdown will be completed after the KMA restarts.
• Any in-progress technical support sessions will be terminated.
• Any open KMA console sessions, including the one performing this procedure, will be
terminated.
• Any open OKM Manager sessions to this KMA will return an error on any attempt to
contact the KMA while it is shutdown.
• Long running actions, such as upgrades or backups will be terminated when the KMA is
shutdown.
• Any in-process requests from Agents will fail while the KMA is shutdown. The Agent will
then reconnect to a different KMA, if it can contact another KMA. If not, Agent requests
(such as: retrieve a key during a tape mount) will fail.
• The KMA is not removed from the cluster while it is shut down. Other cluster members
will attempt to contact the KMA while it is shut down (unless the KMA was logged out,
see ). One or more of the remaining KMAs will issue an SNMP INFORM when they are
unable to contact the shut down KMA. If the KMA is not expected to be returned to
service, the reset KMA procedure should be used instead of this one.
Available to: Operator
1. If the KMA has been shut down for at least a few hours and the Autonomous Unlock
option is enabled, lock the KMA before restarting the KMA. After recent updates have
been propagated to this KMA, as shown by the Replication Lag Size in the KMA List
panel, unlock the KMA .
2. You should log the KMA out of the cluster before shutting it down to avoid other KMAs
attempting to communicate with the shutdown KMA. See Change a KMA Passphrase
(Log the KMA Out of the Cluster).
3. Log into OKM console. At the Please enter your choice: prompt on the main menu,
select Shutdown KMA, and then press Enter.
4. When prompted, type y and press Enter. When finished with shutdown, it displays:
syncing files... done
5. The KMA is now powered off. You can power on the KMA using either the power button
or the remote power control function in the service processor.
14-9
Chapter 14
OKM Console Functions
4. Carefully read the information about the SSH host keys. When prompted to
regenerate the SSH host keys, type y and press Enter.
5. Record and store the SSH host keys somewhere secure.
6. Enter a passphrase. See Technical Support Account Password Requirements.
7. Enter the maximum number of days the passphrase is valid.
Caution:
Enabling this feature allows someone logged in as Technical Support to gain
Primary Administrator access, equivalent to root access. Since the
passphrase for the Primary Administrator is known only by Oracle Support,
only someone from Oracle Support can gain Primary Administrator access.
This may be necessary in some situations to recover the system from a
problem, however, only do so with direct guidance from support.
14-10
Chapter 14
OKM Console Functions
Note:
Renewing the Root CA certificate impacts activity in this cluster and makes the
current backups obsolete. Always plan the renew in advance.
14-11
Chapter 14
OKM Console Functions
SHA Compatibility
Certain types of agents (encryption endpoints) are incompatibility with some versions
of SHA.
Most types of OKM encryption endpoints support SHA-2 hashing algorithms and
X.509v3 certificates. You can enroll agents associated with these encryption endpoints
in an OKM cluster where the Root CA certificate is an X.509v3 certificate that is signed
using a SHA-2 hashing algorithm (such as SHA-256).
Some types of OKM encryption endpoints do not support SHA-2 hashing algorithms
and X.509v3 certificates. You cannot enrolled agents associated with these encryption
endpoints in an OKM Cluster where the Root CA certificate is an X.509v3 certificate
that is signed using a SHA-2 hashing algorithm (such as SHA-256). Instead, you must
enrolled the agents in an OKM Cluster where the Root CA certificate is a X.509v1
certificate that is signed using a SHA-1 hashing algorithm.
Encryption endpoints that have compatibility issues with SHA-2 certificates:
• HP LTO4 tape drives
• IBM LTO4/5/6/7 tape drives running Belisarius firmware version 4.x
All other encryption endpoints will work with SHA-2 certificates. Those specifically
tested are:
• HP LTO5/6 tape drives
• IBM LTO4/5/6/7 tape drives running Belisarius firmware version 5.32.20
• PKCS#11 applications that use the KMS PKCS#11 Provider on Oracle Solaris and
Oracle Linux, including ZFS file systems on Oracle Solaris 11 servers and ZFS
Storage Appliance.
• Oracle Transparent Database Encryption (TDE) on Oracle Database servers
14-12
Chapter 14
OKM Console Functions
2. The current session terminates and the login prompt displays allowing the user to reenter
the OKM Console.
14-13
15
Command Line Utilities
Use the command line utilities as an alternative to using OKM Manager to launch backups,
export keys, import keys, and list data units.
• OKM Command Line Utility
• Backup Command Line Utility
Note:
The OKM Command Line utility supersedes the Backup Command Line utility.
Oracle recommends you use the OKM Command Line utility whenever possible.
15-1
Chapter 15
OKM Command Line Utility
Note:
If you want to enter link-local IPv6 addresses, invoke the OKM Command
Line Utility and specify the link-local IPv6 address. Include the Zone ID (for
example, "%4") at the end of the address. Refer to IPv6 Addresses with
Zone IDs to see what steps you must follow for the initial setup.
If you are using Solaris, and wish to specify or display characters than
cannot be represented in ASCII, then ensure that the appropriate Solaris
locale has been installed on your Solaris system and then your environment
has been configured to use this locale. Refer to the Solaris locale(1) and
localeadm(1M) man pages for more information.
Supported Platforms
• Oracle Solaris 11.4
• Oracle Linux 7 and 8
• Various Microsoft Windows systems, including Microsoft Windows Server 2019
User Roles
The following table details the roles that can perform each function of the command
line.
Action: Role:
Backup Backup Operator
Back up OKM Core Security Security Officer
Import/Export Keys Operator
Destroy Keys Operator
List Audit Events All Roles1
List Data Units Operator/Compliance Officer
Create Agents Operator
Set/Change Agent Default Key Group Compliance Officer
Change Agent Properties Operator
List Agents Operator/Compliance Officer
1 If you specify agent IDs, data unit IDs, or key IDs, you must have the Operator or Compliance Officer role.
backup
Generates a backup of the OKM data and downloads this backup to a backup data
file and a backup key file in the specified output directory.
15-2
Chapter 15
OKM Command Line Utility
backupcs
Generates a backup of the OKM core security and stores this backup in an output file.
okm backupcs [ [ [ --cacert=filename ] [ --usercert=filename ]]
[ --directory=dirname ] | --oper=username ]
[ --retries=retries ] [ --timeout=timeout ]
[ --verbose=boolean ]
--kma=networkaddress
createagent
Creates a new agent.
okm createagent[ [ [ --cacert=filename ] [ --usercert=filename ] ]
[ --directory=dirname ] | --oper=username ]
[ --retries=retries ] [ --timeout=timeout ]
[ --verbose=boolean ]
[ --description=description ]
[ --site=siteid ]
[ --keygroup=defaultkeygroupid ]
[ --onetimepassphrase=boolean ]
--kma=networkaddress
--agent=agentid
--passphrase=agentpassphrase
currload
Displays load information about a KMA.
okm currload [ [ [ --cacert=filename ] [ --usercert=filename ] ]
[ --directory=dirname ] ] | --oper=username
[ --retries=retries ] [ --timeout=timeout ]
[ --verbose=boolean ]
--output=filename
--kma=networkaddress
destroykeys
Destroys deactivated or compromised keys.
okm destroykeys [ [ [ --cacert=filename ] [ --usercert=filename ] ]
[ --directory=dirname ] | --oper=username ]
[ --retries=retries ] [ --timeout=timeout ]
[ --verbose=boolean ]
--kma=networkaddress
--duids=filename | --all=true
--keystate=keystate
--comment="text"
export
Creates a secure key file for a transfer partner that has been established with the OKM. All
keys associated with a list of data units are exported using this key file and are protected
using an AES-256-bit key that signs the key file. This list of data units is the result of the
given filter string or file name. This key file can then be used to import the keys into the
transfer partner's OKM using the import subcommand. Up to 1,000 data units can be
exported on a single invocation of the kms command.
15-3
Chapter 15
OKM Command Line Utility
import
Reads a secure key file for a transfer partner that has been established with the OKM.
Keys and their associated data units are imported using this key file. The key transfer
private key of the importing OKM is used to validate the key file. This file must be one
that was previously exported from another OKM using the export subcommand.
okm import [ [ [ --cacert=filename ] [ --usercert=filename ] ]
[ --directory=dirname ] ] | --oper=username
[ --retries=retries ] [ --timeout=timeout ]
[ --verbose=boolean ]
[ --overrideeuiconflict=boolean ]
--kma=networkaddress
--input=filename
--partner=transferpartnerid
--keygroup=keygroupid
listagentperformance
Lists agents and performance information about them. This performance information
includes rate or count values and average processing time for various create and
retrieve key requests. You can filter the list to produce a specific report containing just
a subset of the agents.
okm listagentperformance [ [ [ --cacert=filename ] [ --usercert=filename ] ]
[ --directory=dirname ] | --oper=username ]
[ --filter=filter ]
[ --retries=retries ] [ --timeout=timeout ]
[ --listwait=waittime ] [ --verbose=boolean ]
[ --output=filename ]
[ --startdate=date ] [ --enddate=date ]
[ --localtimezone=boolean ]
[ --rateinterval=rateinterval ]
--kma=networkaddress
listagents
Lists agents and their properties. You can filter the list to produce a specific report
containing just a subset of the agents.
okm listagents[ [ [ --cacert=filename ] [ --usercert=filename ] ]
[ --directory=dirname ] | --oper=username ]
[ --retries=retries ] [ --timeout=timeout ]
[ --listwait=waittime ] [ --verbose=boolean ]
[ --filter=filter ] [ --output=filename ]
--kma=networkaddress
listauditevents
Lists audit events.
okm listauditevents [ [ [ --cacert=filename ]
[ --usercert=filename ] ]
[ --directory=dirname ] |
15-4
Chapter 15
OKM Command Line Utility
[ --oper=username ]
[ --filter=filter ]
[ --localtimezone=boolean ]
[ --maxcount=count ]
[ --retries=retries ]
[ --timeout=timeout ]
[ --verbose=boolean ]
[ --output=filename ]
[ --agentids=agentids |
--dataunitids=dataunitds |
--keyids=keyids ]
--kma=networkaddress
listdu
Lists data units and their properties. This subcommand can be invoked before executing the
export subcommand to determine the data units that are exported using the specified filter
(if any).
okm listdu [ [ [ --cacert=filename ] [ --usercert=filename ] ]
[ --directory=dirname ] ] | --oper=username
[ --filter=filter ]
[ --retries=retries ] [ --timeout=timeout ]
[ --listwait=waittime ] [ --verbose=boolean ]
[ --output=filename ]
--kma=networkaddress
listdukeycount
Lists data units that have associated keys and a count of these keys. You can filter the list to
produce a specific report containing just a subset of the data units.
okm listdukeycount[ [ [ --cacert=filename ] [ --usercert=filename ] ]
[ --directory=dirname ] | --oper=username ]
[ --filter=filter ]
[ --retries=retries ] [ --timeout=timeout ]
[ --listwait=waittime ] [ --verbose=boolean ]
[ --output=filename ]
--kma=networkaddress
--duids=filename | --all=true
listkeys
Lists keys and their properties. You can filter the list to produce a specific report containing
just a subset of the keys.
okm listkeys [ [ [ --cacert=filename ] [ --usercert=filename ] ]
[ --directory=dirname ] | --oper=username ]
[ --filter=filter ]
[ --retries=retries ] [ --timeout=timeout ]
[ --listwait=waittime ] [ --verbose=boolean ]
[ --output=filename ]
--kma=networkaddress
listkmaperformance
Lists KMAs and performance information about them. This performance information includes
rate or count values and average processing time for key requests from agents, replication
requests from peer KMAs, requests from users, and Server Busy conditions on the local
KMA. You can filter the list to produce a specific report containing just a subset of the KMAs.
okm listkmaperformance [ [ [ --cacert=filename ] [ --usercert=filename ] ]
[ --directory=dirname ] | --oper=username ]
15-5
Chapter 15
OKM Command Line Utility
[ --filter=filter ]
[ --retries=retries ] [ --timeout=timeout ]
[ --listwait=waittime ] [ --verbose=boolean ]
[ --output=filename ]
[ --startdate=date ] [ --enddate=date ]
[ --localtimezone=boolean ]
[ --rateinterval=rateinterval ]
--kma=networkaddress
modifyagent
Changes properties of an existing agent, including its default key group. You must
also specify at least one of the following options: --enabled, --site, --description, --
keygroup, --passphrase, --onetimepassphrase
okm modifyagent[ [ [ --cacert=filename ] [ --usercert=filename ] ]
[ --directory=dirname ] | --oper=username ]
[ --retries=retries ] [ --timeout=timeout ]
[ --verbose=boolean ]
[ --description=description ] |
[ --site=siteid ] |
[ --keygroup=defaultkeygroupid ] |
[ --passphrase=agentpassphrase ] |
[ --enabled=boolean ] |
[ --onetimepassphrase=boolean ]
--kma=networkaddress
--agent=agentid
systemdump
Generates and downloads a system dump file.
okm systemdump [ [ [ --cacert=filename ] [ --usercert=filename ] ]
[ --directory=dirname ] | --oper=username ]
[ --retries=retries ] [ --timeout=timeout ]
[ --verbose=boolean ]
[ --contents=contents ]
--kma=networkaddress
--output=filename
Note:
Users must first export the Root CA and user X.509 certificates from the
OKM Manager GUI before invoking this utility with the --cacert, --
directory, and --usercert options.
15-6
Chapter 15
OKM Command Line Utility
15-7
Chapter 15
OKM Command Line Utility
15-8
Chapter 15
OKM Command Line Utility
15-9
Chapter 15
OKM Command Line Utility
listagentperformance
On the listagentperformance subcommand, the syntax of this filter string is:
AgentID=agentid[, SiteID=siteid][, DefaultKeyGroupID=kgid]
• AgentID=agentid — Where agentid is an agent name. The CLI uses the "starts
with" operator (instead of equality) when matching on this field as some agents
supply trailing blanks to the value for this field.
• SiteID=siteid — Where siteid is a Site ID.
• DefaultKeyGroupID=kgid — Where kgid is a key group ID.
listauditevents
On the listauditevents subcommand, the syntax of this filter string is:
StartDate=date[, EndDate=date ][, Severity=text]
[, Operation=text][, Condition=text] [, Class=text]
[, RetentionTerm=text] [, KMAName=kmaname]
[, EntityID=entityid][, EntityNetworkAddress=netaddress]
[, SortOrder=order][, ShowShortTerm=boolean]
15-10
Chapter 15
OKM Command Line Utility
• StartDate=date — Where date has the format: YYYY-MM-DD hh:mm:ss and represents
UTC time.
• EndDate=date — Where date has the format: YYYY-MM-DD hh:mm:ss and represents
UTC time.
• Severity=text — Where text is an audit severity string (for example, "Error").
• Operation=text — Where text is an audit operation string (for example, "Retrieve Root
CA Certificate").
• Condition=text — Where text is an audit condition string (for example, "Success").
• Class=text — Where text is an audit class string (for example, "Security Violation").
• RetentionTerm=text — Where text is an audit retention term string (for example,
"MEDIUM TERM RETENTION").
• KMAName=kmaname — Where kmaname is a KMA name.
• EntityID=entityid — Where entityid is an Entity ID.
• EntityNetworkAddress=netaddress — Where netaddress is an IP address or host
name.
• SortOrder=order — Where order can be "asc" or "desc." By default, audit events are
displayed in descending order by Created Date.
• ShowShortTerm=boolean — Where boolean can be "true" or "false." By default, audit
events that have a short term retention are not displayed.
listkeys
On the listkeys subcommand, the syntax of this filter string is:
KeyState=state[, KeyID=keyid][, KeyGroupID=kgid]
[, Exported=boolean][, Imported=boolean]
[, Revoked=boolean]
• KeyState=state — Where state can be one of the following: gen, ready, pnp, proc, deact,
comp, dest
• KeyID=keyid — Where keyid is a Key ID.
• KeyGroupID=kgid — Where kgid is a key group ID.
• Exported=boolean — Where boolean can be "true" or "false".
• Imported=boolean — Where boolean can be "true" or "false".
• Revoked=boolean — Where boolean can be "true" or "false".
listkmaperformance
On the listkmaperformance subcommand, the syntax of this filter string is:
KMAName=kmaname[, SiteID=siteid]
15-11
Chapter 15
OKM Command Line Utility
Generating Backups
Generating backup using certificates in the ca.crt and clientkey.pem files in the given
directory for authentication:
• Solaris or Linux:
okm backup --kma=mykma1 \
--directory/export/home/Joe/.sunw/kms/BackupOperatorCertificates
\
--output=/export/home/KMSBackups
• Windows:
okm backup --kma=mykma1
--directory=D:\KMS\Joe\BackupOperatorCertificates
--output=D:\KMS\KMSBackups
Generating a backup using the user ID and passphrase of a OKM user for
authentication:
• Solaris or Linux:
okm backup -k mykma1 -o /export/home/KMSBackups -b Joe
• Windows:
okm backup -k mykma1 -o D:\KMS\KMSBackups -b Joe
Exporting Keys
Exporting keys using certificates in the ca.pem and op.pem files in the current working
directory for authentication:
• Solaris or Linux:
okm export -k 10.172.88.88 -d "." -a ca.pem -u op.pem \
-f "DUState = normal+needs-rekey, Exported = false" \
-o Partner.dat -p Partner
• Windows:
okm export -k 10.172.88.88 -d "." -a ca.pem -u op.pem
-f "DUState = normal+needs-rekey, Exported = false"
-o Partner.dat -p Partner
Exporting keys using the user ID and passphrase of a OKM user for authentication:
• Solaris or Linux:
okm export --kma=mykma1 --oper=tpFreddy \
--filter="Exported = false" --output=Partner.dat \
--partner=Partner
• Windows:
15-12
Chapter 15
OKM Command Line Utility
Importing Keys
Importing keys using certificates in the ca.crt and clientkey.pem files in the current working
directory for authentication:
• Solaris or Linux:
okm import --kma=10.172.88.88 --directory="." \
--input=DRKeys.dat --partner=Partner \
--keygroup=OpenSysBackupKeyGroup
• Windows:
okm import --kma=10.172.88.88 --directory="."
--input=DRKeys.dat --partner=Partner
--keygroup=OpenSysBackupKeyGroup
Importing keys using the user ID and passphrase of a OKM user for authentication.
• Solaris or Linux:
okm import --kma=mykma1 --oper=Joe --input=DRKeys.dat \
--partner=Partner --keygroup=OpenSysBackupKeyGroup
• Windows:
okm import --kma=mykma1 --oper=Joe --input=DRKeys.dat
--partner=Partner --keygroup=OpenSysBackupKeyGroup
• Windows:
okm listdu --kma=10.172.88.88
--directory=D:\KMS\Joe\OperatorCertificates
--output=D:\KMS\KMSDataUnits
Listing data units using the user ID and passphrase of a OKM user for authentication:
• Solaris or Linux:
okm listdu -k mykma1 -b Joe -f "Exported=false" \
--output=/export/home/KMSDataUnits
• Windows:
okm listdu -k mykma1 -b Joe -f "Exported=false"
--output=D:\KMS\KMSDataUnits
15-13
Chapter 15
OKM Command Line Utility
• Solaris or Linux:
okm listauditevents --kma=10.172.88.88 \
--directory=/export/home/Joe/.sunw/kms/
OperatorCertificates \
--filter=Severity=Error \
--output=/export/home/KMSAuditEvents
• Windows:
okm listauditevents --kma=10.172.88.88
--directory=D:\KMS\Joe\OperatorCertificates
--filter=Severity=Error
--output=D:\KMS\KMSAuditEvents
Listing audit events using the user ID and pass phrase of a OKM user for
authentication.
• Solaris or Linux:
okm listauditevents -k mykma1 -b Joe -f "Severity=Error" \
--output=/export/home/KMSAuditEvents
• Windows:
okm listauditevents -k mykma1 -b Joe -f "Severity=Error"
--output=D:\KMS\KMSAuditEvents
Destroying Keys
The following examples destroy all compromised keys using certificates in the ca.crt
and clientkey.pem files in the given directory for authentication.
• Solaris or Linux:
okm destroykeys --kma=10.172.88.88 \
--directory=/export/home/Joe/.sunw/kms/OperatorCertificates
\
--all=true --keystate=comp \
--comment="Joe destroyed compromised keys"
• Windows:
okm destroykeys --kma=10.172.88.88
--directory=D:\KMS\Joe\OperatorCertificates
--all=true --keystate=comp
--comment="Joe destroyed compromised keys"
The following examples destroy deactivated keys associated with a list of data unit
IDs using the user ID and passphrase of a OKM user for authentication.
• Solaris or Linux:
okm destroykeys -k mykma1 -b Joe -i DeactivatedDUIDs.txt \
-s deact -C "Joe destroyed deactivated keys"
• Windows:
okm destroykeys -k mykma1 -b Joe -i DeactivatedDUIDs.txt
-s deact -C "Joe destroyed deactivated keys"
15-14
Chapter 15
OKM Command Line Utility
• Solaris or Linux:
okm backupcs --kma=10.172.88.88 \
--directory=/export/home/Joe/.sunw/kms/SecurityOfficerCertificates \
--output=/export/home/KMSCoreSecurity.xml
• Windows:
okm backupcs --kma=10.172.88.88
--directory=D:\KMS\Joe\SecurityOfficerCertificates
--output=D:\KMS\KMSCoreSecurity.xml
The following examples back up core security using the user ID and passphrase of a OKM
user for authentication.
• Solaris or Linux:
okm backupcs -k mykma1 -b Joe -o /export/home/KMSCoreSecurity.xml
• Windows:
okm backupcs -k mykma1 -b Joe -o D:\KMS\KMSCoreSecurity.xml
listdu.pl
#!/opt/csw/bin/perl
## the kms CLI utility must be in your path
$cmd="okm";
$KMA="kma1.example.com";
$FILTER="--filter=Exported=false";
$DIRECTORY=".";
$OUTPUT="listdu.txt";
system("$cmd listdu --verbose=true --directory=$DIRECTORY --kma=$KMA $FILTER
--output=$OUTPUT")
export.pl
#!/opt/csw/bin/perl
## the kms CLI utility must be in your path
$cmd="okm";
$KMA="kma1.example.com";
15-15
Chapter 15
Backup Command Line Utility
$TP="DestinationPartner";
$FILTER="Exported=false";
$OUTPUT="$TP.dat";
system("$cmd export --verbose=true --kma=$KMA --directory=. --filter=$FILTER
--partner=$TP --output=$OUTPUT");
import.pl
#!/opt/csw/bin/perl
## the kms CLI utility must be in your path
$cmd="okm";
$KMA="kma1.example.com";
$TP="SourceTransferPartner";
$KEYGROUP="MyKeyGroup";
$INPUT="../aberfeldy/KeyBundle.dat";
system("$cmd import --verbose=true --kma=$KMA --directory=. --partner=$TP
--keygroup=$KEYGROUP --input=$INPUT");
backup.pl
#!/opt/csw/bin/perl
## the following must be in your path
$cmd="okm";
$KMA="kma1.example.com";
$DIRECTORY=".";
$OUTPUT=".";
system("$cmd backup --verbose=true --directory=$DIRECTORY --kma=$KMA
--output=$OUTPUT")
Solaris 10 Syntax
OKM_Backup [-UserID userid] [-Passphrase passphrase]
-KMAIPAddress IPaddress -BackupFilePath pathname
[-Retries retries] [-Timeout timeout]
Parameter Descriptions
userid — The Backup Operator user ID. This must be a Backup Operator.
passphrase — The passphrase for the user ID. If the userid or passphrase value is not
specified, the utility prompts you for these values.
IPaddress — The KMA Management Network Address on which to launch the backup.
pathname — The location where the backup file and backup key file should be
downloaded on your system.
retries — The number of times that this utility tries to connect to the KMA, if the KMA is
busy. The default is 60.
timeout — The timeout value in seconds between these entries. The default is 60.
15-16
Chapter 15
Backup Command Line Utility
Note:
The passphrase can optionally be specified on the command line using the -
Passphrase parameter.
15-17
16
Certificates
A certificate is an electronic document used to prove the ownership of a public key. You can
generate, sign, save, and renew certificates.
• Generate and Sign Certificates Using SHA-256
• Ongoing Renewal Policy for the Root CA Certificate
• Save a Client Certificate
Note:
Plan this procedure in advance. It impacts the entire cluster's KMAs, agents, and
disaster recovery (obsoletes backups). If you have a lot of tape agents, use the
Oracle Virtual Operator Panel 2.2 spreadsheet feature to automate the re-
enrollment process and reduce downtime.
16-1
Chapter 16
Generate and Sign Certificates Using SHA-256
2. Ensure that the replication version is greater at least 16 for the selected KMA. See
Check the Replication Version of the KMA. If the version is less than 16, switch the
replication version to 16. See Switch the Replication Version.
3. Launch the OKM Console on the KMA that you will use to renew, and log into it as
a Security Officer. Select the menu option to Renew the Root CA Certificate (see
Renew the Root CA Certificate).
16-2
Chapter 16
Ongoing Renewal Policy for the Root CA Certificate
16-3
Chapter 16
Save a Client Certificate
Note:
Store these certificate files in a secure location with sufficient permissions to
restrict access by other users.
The -nodes argument is necessary to export the private key. Since the private
key is not password protected, you should appropriately manage this file. The
Import Password can optionally be specified on the command line using the -
passin parameter, if required.
16-4
A
Disaster Recovery
Disaster recovery is the process for recovering or preventing the loss of business critical
information after a natural or human-induced disaster.
• Recover a KMA
• Example Scenarios for Recovering Data
Recover a KMA
The cluster allows the system to recover from a KMA failure, as long as there is at least one
functioning KMA in the cluster.
OKM uses a cluster of at least two KMAs to reduce the risk of disruptions and assist in
recovery. Clustering KMAs allows you to replicate database entries and balance workloads. If
a component fails, it can be easily replaced and restored. When designing an encryption and
archive strategy, you should ensure that critical data is replicated and vaulted off-site (see
Example Scenarios for Recovering Data). If at least one KMA remains operational, you can
recover a single KMA without impacting the rest of the cluster.
The following sections address scenarios that require recovery of a single KMA.
A-1
Appendix A
Example Scenarios for Recovering Data
This operation offers the option to scrub the server's hard disk as an extra security
precaution. Disposition of the failed server is handled by the customer. Oracle service
representative can repair and add a KMA server to the cluster as described in the
Oracle Key Manager 3 Installation and Service Manual, PN E48395-xx. Once added
the cluster, the database replicates, KMAs in the cluster re-synchronize, and the new
KMA becomes an active member of the cluster.
A-2
Appendix A
Example Scenarios for Recovering Data
The figure below shows an disaster recovery example where the amount of time to recover
business continuity is a matter of minutes. If the KMAs at Site 1 were destroyed, and the
infrastructure at Site 2 is still intact, a WAN used as the Service Network that connects the
tape drives between the two sites allows the intact KMAs from Site 2 to continue tape
operations between both sites. Once the KMAs are replaced at Site 1, they self-replicate from
the surviving KMAs at the intact Site 2.
A-3
Appendix A
Example Scenarios for Recovering Data
A-4
Appendix A
Example Scenarios for Recovering Data
This customer uses a simple backup scheme that consists of daily incremental backups,
weekly differential backups, and monthly full backups. The monthly backups are duplicated at
the DR site and sent to an off-site storage facility for 90 days. After the 90-day retention
period, the tapes are recycled. Because the customer owns the equipment at the DR site, this
site is just an extension of the customer that strictly handles the back-up and archive
processes.
A-5
Appendix A
Example Scenarios for Recovering Data
A-6
Appendix A
Example Scenarios for Recovering Data
Note:
A DR site may also be configured as a Key Transfer Partner.
A-7
Appendix A
Example Scenarios for Recovering Data
This process requires each party in the transfer to establish a public/private key pair.
Once the initial configuration is complete the sending party uses Export Keys to
generate a file transfer and the receiving party then uses Import Keys to receive the
keys and associated data.
As a practice, it is not recommended to use Key Transfer Partners for Disaster
Recovery. However, when DR sites create keys during the backup process, doing a
key transfer can incrementally add the DR sites keys to the already existing data base.
The Key Transfer process requires each user to configure a Transfer Partner for each
OKM Cluster: one partner exports keys from their cluster and the other partner imports
keys into their cluster. When configuring Key Transfer Partners, administrators must
perform tasks in a specific order that requires the security officer, compliance officer,
and operator roles.
To configure Key Transfer Partners, see "Transfer Keys Between Clusters".
A-8
B
Configure the Network for the SL4000
The SL4000 network configuration differs from that of older tape libraries such as the SL8500
and SL3000. This section provides procedures on how to configure the network with an
SL4000.
The SL4000 Modular Library System has an internal tape drive network which requires only a
single connection to Oracle Key Manager (OKM) rather than individual connections to each
encryption-enabled tape drive.
The following devices must be on the same network subnet:
• SL4000 OKM network port
• Key Management Appliances (KMAs) that require network connectivity with the SL4000
tape drives
In the examples provided in this document, 10.80.46.89 is the SL4000 OkmIpv4Address.
B-1
Appendix B
Configure the KMA to Connect with the SL4000
• All SL4000 library base units are assigned an internal drive IP subnet of
192.168.1.0.
• Drive Expansion Modules (DEMs) are assigned an IP address with a different third
octet based upon whether the module is installed to the left or right of the base
module.
Note:
You can either add the specific routes to the base drive module, or if you
have multiple DEMs adding a route of 192.168.0.0 will enable access to
all drives in the base and DEMs.
1. Identify the KMAs in the same subnet as the SL4000 that need to access the
SL4000 internal drive network. Perform the following on only KMAs that reside on
that subnet, not all KMAs in the cluster.
2. Log in to the OKM console with the Security Officer role, and open the
configuration menu.
3. Enter 5 at the prompt to Modify Gateway Settings.
4. Select option 1 Add a gateway.
5. Select option 2 Service to select the network.
6. Select option 2 Network to select the route type.
7. Enter the network values:
Enter 10.80.46.89 for the Gateway IP Address.
Enter 192.168.0.0 for the Destination IP Address.
Enter 255.255.0.0 for the Route Subnet Mask.
B-2
Appendix B
Enable SL4000 Drive Access Using MDVOP
The Gateway IP Address is the IP Address assigned to the SL4000 OKM Network port.
8. Enter y to commit the changes.
9. Select option 3 Exit gateway configuration.
Repeat this procedure as necessary for any OKM appliance that needs Service Network
access to the SL4000 internal drive network.
Windows:
1. Display the current routes
route print
2. Add the route for all modules containing drives in the SL4000 (Base plus the DEMs) in
the form:
route add -p 192.168.0.0 mask 255.255.0.0 OkmIpv4Address
Example:
route add -p 192.168.0.0 mask 255.255.0.0 10.80.46.89
Solaris:
1. Display the current routes.
netstat -rn
2. Add the route for all modules containing drives in the SL4000 (Base plus the DEMs) in
the form:
route add 192.168.0.0 OkmIpv4Address
Example:
route add 192.168.0.0 10.80.46.89
Linux:
1. Display the current routes.
netstat -rn
2. Add the route for all modules containing drives in the SL4000 (Base plus the DEMs) in
the form:
route add -net 192.168.0.0 netmask 255.255.0.0 gw OkmIpv4Address dev eth1
Example:
B-3
Appendix B
Enable SL4000 Drive Access Using MDVOP
B-4
C
Switch Configurations
Use these procedures to configure the Brocade, Extreme, and 3COM switches.
• Brocade ICX 6430 Switch Configuration
• Extreme Network Switch Configuration
• 3COM Network Switch Configuration
C-1
Appendix C
Brocade ICX 6430 Switch Configuration
Note:
In this example, the ports had been put into VLAN 1, as indicated by the
leading "1/" in the trunk commands. If no VLAN was created on the ports,
then the trunk commands should not have the leading "1/". For example:
Brocade(config)#trunk ethernet 1/1 to 1/2
6. In the web interface, navigate to Configuration > Trunk and view the trunks that
you just defined in the CLI.
7. Attach network cables between the pairs of ports on the switch to the service and
aggregated service ports on each KMA that should contain aggregated service
ports. Port IDs (shown in step 6) are associated with physical ports on the switch.
To do this:
a. Inspect the switch and identify the physical ports that are associated with the
trunk groups that you created in step 5 and viewed in step 6.
b. For each KMA, attach a network cable between the first port in the trunk group
and the service port on the KMA (labeled LAN 2 or NET 2).
c. Attach a network cable between the second port in the trunk group and the
aggregated service port on the KMA (labeled LAN 3 or NET 3).
Port Mirroring
Mirroring ports can be useful when you want to use a network analyzer in the service
network environment. Ports can be mirrored on Brocade ICX 6430 switches as follows:
1. Telnet to the switch management port.
2. On this switch, select a port that is not part of a trunk (for example, port 24 is
designated as "1/1/24").
3. Access privileged mode on the switch by entering enable (# will be appended to
the prompt indicating you are in privileged mode).
4. Enter configuration mode by entering configure terminal (you will see (config)
appended to the prompt indicating config mode).
5. Configure the mirror-port with the command mirror-port ethernet 1/1/24.
6. Determine what port traffic you want to monitor (for example, port 1 designated as
1/1/1).
7. Enter the interface menu for port 1/1/1 by entering interface ethernet 1/1/1 (config-
if-e1000-1/1/1 is appended to the prompt indicating you are configuring that port).
C-2
Appendix C
Extreme Network Switch Configuration
8. Enter monitor ethernet 1/1/24 both to monitor traffic in both directions on port 24.
9. Enter write to save the configuration changes.
In Figure 1-8, the service network consists of two customer-provided managed switches that
are cabled to two unmanaged switches, which contains redundant paths that require a
spanning tree configuration. This example may be easily scaled for larger SL8500 drive
configurations by adding additional KMAs, switch hardware, and tape drives.
• Managed switches must be enabled for Spanning Tree whenever the cabling includes
redundancy.
• Unmanaged switches have two paths to the managed switches for redundancy.
• Unmanaged switches are then cabled for connectivity to the tape drives (agents)
• Each unmanaged switch connects 16 drives. Cabled in groups of four. Ports 1–4, 6–9,
11–14, and 16–19.
• Service Delivery Platform (SDP) connects to each Managed Switch at Port 1.
Note:
The SPARC servers are not currently supported by SDP. Development has not
been done on the SDP side.
C-3
D
Advanced Security Transparent Data
Encryption (TDE)
Use OKM with Transparent Data Encryption (TDE) to manage encryption or decryption of
sensitive database information.
• About Transparent Data Encryption (TDE)
• Load Balancing and Failover When Using pkcs11_kms
• Planning Considerations When Using TDE
• Integrate OKM and TDE
• Migrate Master Keys from the Oracle Wallet
• Convert from Another Hardware Security Module Solution
• Key Destruction When Using TDE
• Key Transfer in Support of Oracle RMAN and Oracle Data Pump
• Attestation, Auditing, and Monitoring for TDE
• Locate TDE Master Keys in OKM
• Troubleshoot pkcs11_kms Issues
This section assumes familiarity with TDE. See the white paper Oracle Advanced Security
Transparent Data Encryption Best Practices, available at the following URL:
https://www.oracle.com/br/a/tech/docs/technical-resources/twp-transparent-data-encryption-
bestpractices.pdf
D-1
Appendix D
About Transparent Data Encryption (TDE)
TDE provides encryption services using a two-tiered key approach for TDE column
encryption and TDE tablespace encryption. The first tier uses a master encryption key
to encrypt the second tier table or tablespace data encryption keys that are stored
within the database.
TDE stores the master encryption key in an external security module (Oracle Wallet or
hardware security module). This is a recommended security practice and is crucial to
maintaining the highest level of security from various threats. Use of OKM for the
secure storage of the TDE master encryption keys is the recommended approach.
With TDE configured to use OKM, OKM creates and safely protects the AES256
master encryption key. OKM protects keys through replication (multiple copies across
the cluster) and through backups of OKM itself.
Refer to Disaster Recovery for information about disaster recovery planning.
The following minimum versions are supported when using OKM with TDE:
Oracle Key Manager
• Oracle Key Manager 2.4.1 operating with Replication Schema version 13
• Supported OKM management platforms for the GUI and CLI are documented in
the OKM product release notes, which include specific considerations for Oracle
Solaris and Microsoft Windows platforms.
pkcs11_kms
• Oracle Solaris 11 Express with SRU 12
• Oracle Solaris 11 with x86 or SPARC, 32 bit or 64 bit
• Oracle Solaris 10 Update 10 pkcs11_kms patch 147441-03 for x86 or patch
147159-02 for SPARC, 32 bit or 64 bit
• Oracle Linux Server release 5.5 or higher.
Oracle Database
D-2
Appendix D
Load Balancing and Failover When Using pkcs11_kms
OKM can be integrated with TDE as the following versions of the Oracle Database server on
a supported pkcs11_kms platform:
• Oracle Database 11.2.0.2 with patch 12626642
• Oracle Database 11.2.0.4
• Oracle Database 12.1 and 12.2
D-3
Appendix D
Planning Considerations When Using TDE
The pkcs11_kms provider is aware of the OKM cluster through use of OKM cluster
services, a load balancer, and cluster failover logic. The pkcs11_kms provider
transparently maintains client-side awareness of the OKM cluster by periodically
issuing cluster discovery operations. Network changes and changes in the OKM
cluster or KMA availability are handled by the agent on behalf of the pkcs11_kms
provider and TDE. PKCS#11 key generation and key retrieval operations are load
balanced across KMAs in the OKM cluster.
To further optimize key retrieval performance, agents may be configured to be
associated with KMAs through use of OKM sites. This feature allows definition of sites
according to network topology. Typically, KMAs and agents within a site would have
low network latency as opposed to member KMAs and agents across a WAN.
When a network segment or KMA is unavailable, the failover logic within the agent
chooses another KMA to complete the operation. TDE is unaware of any failovers, so
key management operations are very reliable. Failover preferences KMAs within the
same site as the agent.
You can use the kmscfg(1M) utility to tune the discovery frequency and the failover
properties of the agent. See the kmscfg man page for more information.
D-4
Appendix D
Planning Considerations When Using TDE
• Oracle Data Guard. All secondary databases access the same OKM cluster used by the
primary database.
• Multiple Database Instances. When running multiple independent database instances on
a host, a PKCS#11 token must be configured for each instance. This amounts to creating
an OKM agent for each database instance, and authenticating the agent to OKM through
the token. Use the kmscfg tool to complete this task. When running multiple database
instances under the same O/S user, but using different OKM agents, you must set the
KMSTOKEN_DIR environment variable to a different location each time you invoke the
kmscfg utility. See Configure Database for TDE for more information about the kmscfg
utility. For more information about running multiple databases on the same host, refer to
the document Oracle Advanced Security Transparent Data Encryption Best Practices,
referenced at the beginning of this appendix.
• Oracle RMAN
• Oracle Data Pump
D-5
Appendix D
Planning Considerations When Using TDE
• See Re-Key Due to OKM Policy Based Key Expiration for information about an
issue that can occur when a key policy is not set to a long enough time period.
D-6
Appendix D
Integrate OKM and TDE
enforces unique labels unless the agent includes a default key group attached to a key policy
where "Allows Revocation" is true. In this case, OKM relaxes the uniqueness constraints and
issues a warning instead of an error for duplicate labels.
If a label conflict occurs between different master keys for different database instances, the
first label created is always returned. Any agent attempting to access a key that shares an
identical label belonging to another key group will be denied by OKM. This is detected during
a re-key operation, and the work around is to re-key until another, non-conflicting, label is
generated.
pkcs11_kms
pkcs11_kms is supported on the following platforms:
• Oracle Solaris 11.x (all SRUs)
• Oracle Solaris 10 Update 10 pkcs11_kms patch 147441-03 for x86 or patch 147159-02
for SPARC, 32 bit or 64 bit
• Oracle Linux Server, release 5.5, 5.6, 5.9, 6.5, and 7
D-7
Appendix D
Integrate OKM and TDE
Oracle Database
OKM can be integrated with TDE as the following versions of the Oracle Database
server on a supported pkcs11_kms platform:
• Oracle Database 11.2.0.2 with patch 12626642
• Oracle Database 11.2.0.4
• Oracle Database 12.1
• Oracle Database 12.2
Install pkcs11_kms
Install and configure the OKM PKCS#11 Provider, pkcs11_kms, on the Oracle
database server(s).
A pkcs11_kms distribution is available for each platform.
Oracle Solaris 11
1. Display the version of the pkcs_kms package:
#> pkg info -r pkcs11_kms
3. Install the provider into the Solaris Crypto Framework. The singel quotes are
significant.
# cryptoadm install provider='/usr/lib/security/$ISA/pkcs11_kms.so.1'
D-8
Appendix D
Integrate OKM and TDE
SPARC systems require Solaris patch 147159-03 or later. x86 systems require Solaris patch
147441-03 or later. To download Solaris patches, go to: https://support.oracle.com
1. Enter the following command to install the pkcs11_kms package for the hardware
platform.
# pkgadd [-d path to parent dir of package] SUNWpkcs11kms
2. Install the provider into the Solaris Crypto Framework. The single quotes are significant.
# cryptoadm install provider='/usr/lib/security/$ISA/pkcs11_kms.so.1'
1. Log in and click the Patches & Updates tab and search for the specific patch ID directly.
2. pkcs11_kms is distributed as an RPM package. Use RPM package manager commands
to install this software.
For example: rpm -i pkcs11kms-1.3.0-1.x86_64.rpm
Uninstall pkcs11_kms
The procedures for unistalling pkcs11_kms depend on the platform.
Oracle Solaris 11
Enter the following commands:
# cryptoadm uninstall \
provider='/usr/lib/security/$ISA/pkcs11_kms.so.1'
# pkg uninstall system/library/security/pkcs11_kms
D-9
Appendix D
Integrate OKM and TDE
https://updates.oracle.com/download/12626642.html
Once installed, the shared library file (pkcs_kms.so) must be configured for TDE
access. The library path is OS-specific:
• /usr/lib/security/pkcs11_kms.so.1 (Solaris only, 32-bit)
• /usr/lib/security/amd64/pkcs11_kms.so.1 (Solaris only, 64-bit)
• /usr/lib64/pkcs11_kms.so.1 (Linux only, 64-bit)
D-10
Appendix D
Integrate OKM and TDE
associated with the agent will only allow key retrievals from keys in those groups.
This capability could be leveraged in read-only/decryption-only database scenarios
such as in support of a secondary database that will never generate a master key,
but only needs the ability to access the master keys.
Configure kcs11_kms
Configure the pkcs11_kms provider on the Oracle Database nodes that will require TDE
master keys.
1. Configure the agent and pkcs11_kms provider using the Oracle Database user account.
This does not require special privileges for the O/S user. When a host supports "Multiple
Oracle Homes," then the pkcs11_kms token configuration must be in accordance with
each Oracle Database software owner's user account. Refer to the Oracle Database
Installation Guide 11g Release 2 for more information.
2. The kmscfg utility creates one slot configuration per user at a time. It is possible to define
additional slot configurations for an individual user, but only one will be active per
process.
Caution:
The default location of the slot configuration directory for the KMS PKCS#11
provider is /var/kms/$USER on Solaris 11 Express and is /var/
user/$USER/kms on Solaris 11. If you plan to upgrade your Solaris 11
Express system to Solaris 11, then you should first save your slot configuration
elsewhere.
For example:
# cd /var/kms/$USER
# tar cvf ~/save_my_okm_config.tar .
After the upgrade, restore your slot configuration to the new location. For
example:
# mkdir -p /var/user/$USER/kms
# cd /var/user/$USER/kms
# tar xvf ~/save_my_okm_config.tar
If you do not back up pcks11_kms data before you upgrade, your data will
be lost and the master key used by the Oracle data base for encrypted
data will not be available.
The kmscfg utility stores configuration and run-time data in a KMS configuration directory
at one of the following paths:
• /var/user/$USER/kms (Solaris 11)
• /var/kms/$USER (Solaris 10u10 and Solaris 11 Express)
• /var/opt/kms/$USER (Oracle Linux Server)
This directory is overridden by the $KMSTOKEN_DIR environment variable to the
location of the customer's choosing.
D-11
Appendix D
Integrate OKM and TDE
When kmscfg runs, a "profile" name is provided. This name is used for the agent-
specific run-time subdirectory created within the configuration directory described
above.
3. Refer to the kmscfg man page for the default location of its slot configurations. Slot
configurations may be controlled using the KMSTOKEN_DIR environment variable
to define an alternate slot configuration and file system location.
For Oracle RAC, where the agent profile must be shared between Oracle RAC
nodes, use the KMSTOKEN_DIR environment variable to direct kmscfg to create
the profile using the appropriate shared filesystem path. If the KMSTOKEN_DIR
environment variable is set, it must be set persistently for the shell in a shell
configuration file (such as .bashrc) so that it is always set before the database
performing any PKCS#11 operations.
4. Allocate file system storage space for the slot's configuration and run-time
information. If you plan to use Oracle RAC, define the profile in a shared file
system location with permissions that are readable and writable by each of the
Oracle RAC node users.
5. Allocate space requirements to allow for growth in each agent log. The log file is
automatically created and is a helpful troubleshooting tool. The space consumed
by the KMSAgentLog.log file can be managed using a tool like logadm(1M) on
Solaris or logrotate(8) on Oracle Linux Server. Allocating 10 MB for each agent's
profile directory is adequate for most configurations.
6. Initialize a pkcs11_kms provider using the kmscfg utility. In this step, you define a
profile for the OKM agent that will later be associated with a pkcs11_kms token.
# kmscfg
Profile Name: oracle
Agent ID: oracle
KMA IP Address: kma1
b. Verify that the pkcs11_kms token can authenticate with the OKM cluster. This
example uses Oracle Solaris pktool(1), a utility that is not available for Linux
platforms. The SO (PKCS#11 abbreviation for a security officer) prompt is for
the agent's secret passphrase as established in a previous step by the OKM
administrator who created the agent.
solaris> pktool inittoken currlabel=KMS
Enter SO PIN:
Token KMS initialized.
c. On Solaris systems, verify that the token is initialized by using the Solaris
Crypto Framework cryptoadm(1M) command or the pktool(1) utility. Note that
the token's flag shown by output from cryptoadm is now
CKF_TOKEN_INITIALIZED:
D-12
Appendix D
Integrate OKM and TDE
d. On Solaris systems, use the pktool(1) utility to verify the status of PKCS#11 visible
tokens:
glengoyne> pktool tokens
Flags: L=Login required I=Initialized X=User PIN expired S=SO PIN expired
Slot ID Slot Name Token Name Flags
------- --------- ---------- -----
1 Sun Crypto Softtoken Sun Software PKCS#11 softtoken
2 Oracle Key Management System KMS L
glengoyne>
This shows that Login to the token is still required. The meaning of the Flags in the
pktool output can be shown as follows:
glengoyne> pktool tokens -h
Usage:
pktool -? (help and usage)
pktool -f option_file
pktool subcommand [options...]
e. On Solaris systems, use the pktool(1) utility to log in to the token and authenticate
with the OKM cluster's KMA specified in the kmscfg(1) step and the passphrase
created by an OKM administrator for the agent. This passphrase is supplied with the
SO PIN prompt:
glengoyne> pktool inittoken currlabel=KMS
Enter SO PIN:
Token KMS initialized.
f. On Solaris systems, use the pktool(1) utility to verify the tokens status and that it is
now initialized:
glengoyne> pktool tokens
Flags: L=Login required I=Initialized X=User PIN expired S=SO PIN expired
Slot ID Slot Name Token Name Flags
------- --------- ---------- -----
1 Sun Crypto Softtoken Sun Software PKCS#11 softtoken
2 Oracle Key Management System KMS LI
g. On Solaris systems, use the cryptoadm(1M) command to verify that the pkcs11_kms
token is initialized by requesting to see the mechanisms that it supports:
glengoyne> cryptoadm list -m -p provider=/usr/lib/security/'$ISA'/
pkcs11_kms.so.1
Mechanisms:
CKM_AES_KEY_GEN
CKM_AES_CBC
CKM_AES_CBC_PAD
glengoyne>
D-13
Appendix D
Migrate Master Keys from the Oracle Wallet
On Solaris systems, use the pktool(1) utility to create and list keys through the
pkcs11_kms provider as follows:
# pktool genkey token=KMS keytype=aes keylen=256
label=MyKey-test1
# pktool list token=KMS objtype=key
# pktool list token=KMS objtype=key label=MyKey-test1
You can see the keys in the OKM system through the OKM Manager GUI or
OKM CLI.
Note:
For Solaris, kmscfg(1) by default creates just one slot configuration
per user at a time. You can define additional slot configurations, but
only one will be active per process. You can do this by using the
KMSTOKEN_DIR variable to define an alternate slot configuration
and file system location.
The Solaris 11 default is /var/user/$USERNAME/kms, but you can
create your own naming schemes. A best practice might be /var/
user/$USERNAME/$AGENTID-$CLUSTER/ This naming
convention allows Solaris to have multiple slot-agent-cluster
combinations based on various usage scenarios.
For some PKCS#11 configurations, an alternate location is
recommended, for example, TDE with Oracle RAC (see the TDE
configuration section above), so that each node shares the
pkcs11_kms provider's metadata).
8. To configure TDE to use auto-open wallets, follow the instructions described in the
document Oracle Advanced Security Transparent Data Encryption Best Practices,
referenced at the beginning of this appendix.
D-14
Appendix D
Convert from Another Hardware Security Module Solution
Database instance and master encryption key that has reached the post-operational state.
Notification through SNMP v3 informs or SNMP v2 traps may be configured in OKM to
support automation of this process.
The pkcs11_kms provider will attempt to inform its PKCS#11 consumers that the key has
reached the post-operational state. This is done by setting the PKCS#11 "CKA_ENCRYPT"
attribute to false for the master key.
All released versions of Oracle Database 11 and 12 will try to use a key to encrypt data after
its encryption period has expired. TDE will never automatically re-key the TDE master key.
On Solaris, you may see errors similar to the following in the database alert logs:
HSM heartbeat died. Likely the connection has been lost.
PKCS11 function C_EncryptInit returned
PKCS11 error code: 104
HSM connection lost, closing wallet
If this error is encountered, the Database Administrator must perform the following actions:
1. Set an environment variable for the user associated with the pkcs11_kms token (typically
the Oracle user's profile). This allows the deactivated key to continue to be used for
encryption:
# export PKCS11_KMS_ALLOW_ENCRYPT_WITH_DEACTIVATED_KEYS=1
If this message is encountered, the database administrator should re-key the TDE master key
as described in the Oracle Database administration documentation.
In spite of this, TDE will continue to use the key and not perform an automatic re-key
operation. OKM administrators observing the post-operational key retrieval audit warnings
must inform a Database Administrator that it is time to re-key their database instance's
master key.
D-15
Appendix D
Key Transfer in Support of Oracle RMAN and Oracle Data Pump
Once a key has been destroyed, any attempt to retrieve it will fail, including PKCS#11
C_FindObjects requests.
D-16
Appendix D
Troubleshoot pkcs11_kms Issues
contain destroyed keys. These keys can also be viewed using the OKM CLI. For
example:
>okm listdu --kma=acme1 --user=joe \
--filter="ExternalTag=ORACLE.TDE"
2. When multiple Oracle Database instances share an OKM cluster, an OKM administrator
can identify which keys correspond to a particular database by using a query against the
audit events for the agent that corresponds to that database instance. These audit events
can be viewed using the Oracle GUI. Filter the agent's audit history using the filter:
"Operation equals CreateDataUnit". This produces a list of the audit events
corresponding to TDE master key creations. The audit event details provide the
necessary information to identify the specific data units for the master keys. These audit
events can also be viewed using the OKM CLI. For example:
>okm listauditevents --kma=acme1 --user=joe \
--filter="Operation=CreateDataUnit"
D-17
Appendix D
Troubleshoot pkcs11_kms Issues
7. Contact Oracle Technical Support. You may be asked to provide one or more KMA
System Dumps.
D-18
E
Solaris ZFS Encryption
Use OKM with Oracle Solaris 11 ZFS to manage encryption and decryption of files in ZFS
storage pools.
• Use pkcs11_kms with ZFS
• Considerations When Using ZFS
• Integrate OKM and ZFS
This section assumes familiarity with Solaris 11 and Oracle Solaris ZFS.
• Refer to the Oracle Solaris 11 publications for more information about Oracle Solaris 11.
• Refer to the publication Oracle Solaris Administration: ZFS File Systems for more
information about Oracle Solaris ZFS.
E-1
Appendix E
Integrate OKM and ZFS
Note:
Much of the information for these tasks also applies in OKM configurations
using Transparent Data Encryption (TDE). Where appropriate, the following
sections include references to additional information described in the TDE
section.
Note:
The agent should be configured to disable the One Time Passphrase
property. See Create an Agent or View and Modify Agents.
E-2
Appendix E
Troubleshoot pkcs11_kms Issues with ZFS
2. Use the zfs create command to configure ZFS to use this key.
In the "keysource" argument of the zfs create command, specify the label of key that you
generated above.
At the "Enter 'KMS' PKCS#11 token PIN" prompts, enter the passphrase of the agent.
For example:
# zfs create -o encryption=aes-256-ccm -o
keysource="raw,pkcs11:token=KMS;object=zfscrypto_key_256" cpool_nd/cfs
Enter 'KMS' PKCS#11 token PIN for 'cpool_nd/cfs':
E-3
F
Upgrade and Configure Integrated Lights Out
Manager (ILOM)
Use these procedures to upgrade and configure the Service Processor (ILOM) of your KMA.
• About ILOM (Integrated Lights Out Manager)
• ILOM Upgrade Overview
• Verify ILOM and OBP Levels
• Upgrade the ILOM Server Firmware
• Set the Boot Mode for OpenBoot from the ILOM
• ILOM Security Hardening
• Configure OpenBoot Firmware
See Also: For initial configuration of a newly installed KMA, see Initial ILOM Configuration.
Related Documentation
ILOM 5.0:
Documentation is available at https://docs.oracle.com/en/servers/management/ilom/
F-1
Appendix F
ILOM Upgrade Overview
• Oracle ILOM Quick Reference for CLI Commands Firmware Release 4.0
• Oracle ILOM Security Guide Firmware Release 3.x and 4.x
Note:
You can view the current server firmware from the ILOM.
This information describes the procedures to be used with the firmware upgrade
procedures documented in the Oracle ILOM Administrator's Guide for Configuration
and Maintenance Firmware Release 5.0.x.
This appendix assumes familiarity with the Oracle Key Manager solution, in particular,
the Shutdown the KMA procedure with the ILOM web-based interface.
F-2
Appendix F
Upgrade the ILOM Server Firmware
4. In the Start Typing... field, type in the product information (for example, "SPARC T8-1"),
and click Search to see the latest firmware for each release.
The firmware distribution is packaged as a zip file. After you download this file, extract it
and then extract the firmware package.zip file that it contains (if any). The firmware
package is in a pkg file. You upload this file during the upgrade procedure outlined below.
11. Click OK to proceed through a series of prompts. The system automatically reboots when
the Update Status is 100 percent complete.
12. To verify that the updated firmware has been installed, click System Information >
Firmware.
F-3
Appendix F
Set the Boot Mode for OpenBoot from the ILOM
To further secure the KMA, customers may choose to update some ILOM settings (see
Configure ILOM FIPS Mode).
Use of ILOM FIPS mode is recommended and supported, with or without use of the
HMP feature of OKM. Use of HMP enables IPMI 2.0 which does expose the ILOM to
some types of attacks, see https://web.nvd.nist.gov/view/vuln/detail?
vulnId=CVE-2013-4786.
F-4
Appendix F
ILOM Security Hardening
5. Navigate to ILOM Administration > Maintenance and the Reset SP tab. Click the Reset
SP button. You will now lose network connectivity to the ILOM management port. Use a
physical console connection to reconfigure the ILOM management connection.
6. Locate the ILOM backup file saved from the first step of this procedure. Use an editor to
change the XML backup files' setting of the FIPS mode from "disabled" to "enabled". The
restore operation will fail without this update.
7. Once ILOM network connectivity is configured, log in to the ILOM web-based interface.
You should now see that FIPS mode enabled by observing the yellow "F" badge in the
upper-right corner of the web interface.
Navigate to ILOM Administration > Configuration Management. Perform a restore of
the configuration using the ILOM backup.
8. Verify configuration settings were properly restored.
F-5
Appendix F
ILOM Security Hardening
F-6
Appendix F
Configure OpenBoot Firmware
F-7
Appendix F
Configure OpenBoot Firmware
Caution:
It is important to remember your security password and to set the
security password before setting the security mode. If you forget this
password, you cannot use your system; you must then use an ILOM
account with sufficient privileges to reset the NVRAM.
You will then be prompted to supply a secure password. The security password
you assign must be between zero and eight characters. Any characters after the
eighth are ignored. You do not have to reset the system; the security feature takes
effect as soon as you type the command.
3. Specify the security mode to either "command" or "full". Full security is the most
restrictive and will require the password for any operation, including each time the
system boots. For this reason the "command" mode is recommended.
ok.setenv security-mode command
ok
4. It is recommended that you also specify the number of password attempts:
ok setenv security-#badlogins 10
5. Now boot the system and verify that it boots correctly:
ok boot
6. Log in to the ILOM web-based interface. Navigate to Host Management>Boot
Mode. In the Script text box enter "setenv auto-boot? true" and click SAVE. This
configures the host to automatically boot off the default boot device without
entering OpenBoot firmware each time it is booted.
7. Go to Initial ILOM Configuration to continue the installation.
F-8
Index
Numerics backup (continued)
database, 10-1, 10-4
1.0 key file, 11-8 destroy, 10-5
3COM network switch, 1-17, C-3 destroyed data unit keys, 12-19
key sharing, 10-2
restore, 10-4
A view, 10-2
accessibility options, 7-2 Backup Operator role, 8-3
activate Belisarius card, 6-3
software, 12-8 boot mode, F-4
tape drive, 6-5 Brocade switch, 1-17, C-1
active state, 11-1
adapter card, 6-3 C
add
gateways, 3-9, 14-7 cabinet, 2-3
KMA to cluster, 3-14 cables, 1-18
addresses, 6-5, 7-3 certificate, 16-1
agents convert format, 16-4
assign key group, 11-7, 12-15 disaster recovery, 16-3
create, 12-13 for agents, 16-2
delete, 12-15 for users, 16-3
description, 1-6 generate, 16-1
enroll, 5-5 hashing algorithm, 14-12
key retrieval, 1-7 properties, 14-11
manage, 12-13 renew, 16-1
modify details, 12-14 root, 16-1–16-3
performance, 12-15 save, 16-3
set passphrase, 12-14 SHA-256, 16-1
view details, 12-14 sign, 16-1
aggregation, 1-16 change passphrase, 8-1
approve pending operations, 13-3 checklist
assign configure cluster, 5-1
agent to key group, 11-7 install, 2-1
key group, 12-15 QuickStart, 3-2
key group, transfer partner, 11-7, 11-11 clock, 3-17, 12-11
audit logs, 9-5 cluster
Auditor role, 8-3 configure, 3-11, 5-1
autonomous unlock, 3-12, 12-6 connect to, 5-1
description, 1-1
join, 3-14
B log KMA into, 14-4
backup, 10-1 log KMA out, 12-4
command line, 15-16 mixed, 1-2
core security, 10-1, 10-3 older compatibility, 11-13
create, 16-2 profile, 5-2
Index-1
Index
Index-2
Index
G K
gateways key
add, 14-7 compromise, 11-8
delete, 14-7 counts for data unit, 12-20
QuickStart, 3-9 destroy, 12-20
view, 14-7 export file, 11-8
group, 11-6
assign agent, 11-7
H assign transfer partner, 11-7
hardware management pack, 9-3 create, 11-6
hardware security module, 1-14, 12-11 delete, 11-7
hasing algorithm, 14-12 modify, 11-6
HMP, 9-3 view, 11-6
HSM, 1-14, 12-11 group, assign partner, 11-11
import a KMS 1.0 file, 11-8
import from transfer, 11-12
I lifecycle, 11-1
ILOM, F-1 manage, 11-8
boot mode, F-4 modify, 11-8
download firmware, F-2 policy, 11-4
initial configuration, 2-6 create, 11-5
OBP, F-2 delete, 11-6
QuickStart, 3-4 modify, 11-5
security hardening, F-4 view, 11-5
upgrade, F-2, F-3 pool size, 3-13, 12-5
import public, transfer, 11-13
KMS 1.0 Key file, 11-8 sharing, 10-2
transfer partner keys, 11-12 split credentials, 13-2
install states and transitions, 11-1
checklist, 2-1 transfer partners, 11-9
cryptographic card, 2-6 transfer public key, 11-9
documentation, 2-4 view, 11-8
KMA, 2-1 key split credentials, 3-11, 13-2
keyboard navigation, 7-2
Index-3
Index
Index-4
Index
Index-5
Index
Index-6
Index
Index-7