Quantum Q-EKM Guia do Utilizador Página 19

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
Vista de página 18
Overview
Encryption Keys
Quantum Encryption Key Manager User’s Guide 6
Configuration Files 1
The configuration files contain the configuration information for your
Q-EKM server installation.
The two configuration files are named:
ClientKeyManagerConfig.properties
KeyManagerConfig.properties
The configuration files are located in the root QEKM directory as follows:
Tape Drive Table 1
The tape drive table is used by Q-EKM to keep track of all the tape drives
that have ever requested a key from the Q-EM server. The tape drive
table is a non-editable, binary file. Q-EKM automatically adds new/
replaced tape drives to the drive table.
Encryption Keys
An encryption key is typically a random string of bits generated
specifically to scramble and unscramble data. Encryption keys are created
using algorithms designed to ensure that each key is unique and
unpredictable. The longer the length of key used, the harder it is to break
the encryption code.
The IBM LTO-4 and LTO-5 method of encryption uses 256-bit AES
algorithm keys to encrypt data. 256-bit AES is the encryption standard
currently recognized and recommended by the U.S. government, which
allows three different key lengths. 256-bit keys are the longest allowed by
AES.
Windows
c:\Program Files\Quantum\QEKM
Linux
/opt/Quantum/QEKM
Caution: Do not edit these files. If you make a mistake when
altering the configuration files, you could lose access to
your keystore and be unable to encrypt or restore data.
Vista de página 18
1 2 ... 14 15 16 17 18 19 20 21 22 23 24 ... 92 93

Comentários a estes Manuais

Sem comentários