Data Transformation
Thales provides a data transformation tool called dataxform
. This tool has been enhanced to convert the data from ProtectFile to CipherTrust Transparent Encryption format, by providing it with the --migrate
option.
Note
Data migration is NOT required when migrating:
• ProtectFile to CTE-U v10.x
• CTE-U v8.0/v9.0 to CTE-U v10.x
Preparing for Data Transformation
To begin:
-
On CipherTrust Manager, click ProtectFile/ Transparent Encryption UserSpace.
-
Click on a client name to view the rules and access policy associated with that client.
-
Choose the rule for the migration and note the corresponding access policy.
Changing the Access Policy for Windows
-
Click Access Policies.
-
Create an access policy group for migrations (for ex: windows_migration_grp) with Read/Write access for the Administrator.
-
Create an access policy (for ex: windows_migration).
-
Add a access policy rule that gives the administrator Read/Write access permissions.
-
Create an access policy group (for ex: windows_migration_grp) with:
-
OS: Windows
-
Group: Access Control & Encryption
-
Default Access: No Access
-
-
Click on the newly created access policy group (windows_migration_gp) to open it.
-
Search for newly created access policy (windows_migration).
-
Click on the ellipsis and choose Add to Group.
-
-
The newly created access policy group looks like the following graphic. This access policy group will be used for all of the rules.
-
Change the access policy group for the current rule to this newly created access policy group.
-
Apply changes and wait for rules to be applied at client.
-
-
On CipherTrust Manager, navigate to the corresponding CipherTrust Transparent Encryption offline (Dataxform) GuardPoint and enable it:
-
On CM, click CTE.
-
Click Client on the relevant client name.
-
Click on ellipses for the GuardPoint and select Enable.
-
Allow sometime for CipherTrust Manager to enable the GuardPoint. When the status changes to Active, the GuardPoint is enabled. At this moment, the CipherTrust Transparent Encryption GuardPoint would be overlaid on the ProtectFile encrypted path. Confirm this by examining the file servers.
Transforming Data in Windows
-
Open the Windows command line as an Administrator.
-
Run the
pfstatus
command, type:**pfstatus.exe**
Note
For ProtectFile file or folder policies, use the absolute file/folder path names with
pfstatus
utility to obtain the status -
Run the status command, type:
secfsd –status guard –v
-
Run the dataxform command, type:
dataxform –-rekey –-migrate --gp <GuardPoint>
-
Run the dataxform command for sparse files, type:
dataxform –-rekey --preserve_sparse_files -–migrate --gp <GuardPoint>
-
Exit the Windows command line tool.
-
After the dataxform has completed, navigate to the corresponding dataxform GuardPoint on the CipherTrust Manager and disable it. Wait for the removal of the GuardPoint from the file server.
-
Navigate to the ProtectFile encryption rule on the CipherTrust Manager and disable it. Wait for the process to complete.
-
Navigate to the corresponding production GuardPoint on CipherTrust Manager and enable it. Wait for the operation to finish. Verify that the CipherTrust Transparent Encryption GuardPoint is reapplied on the file server.
Note
If the Client is member of a ClientGroup, then navigate to the corresponding production GuardPoint in the ClientGroup and enable it. Wait for the operation to finish. Verify that the CipherTrust Transparent Encryption GuardPoint is reapplied on the file server.
Manually Migrating DFS Replication Data
If you are using Distributed File System (DFS) replication, you must manually add additional GuardPoint s for Replication endpoints such as a DFS Private folder.
For each DFS replication client, follow these additional, manual steps for migrating PF encrypted data to CipherTrust Transparent Encryption encrypted data.
-
Navigate to the DFS Replication client on Transparent Encryption on CM. Note the DFS Replication protected path for the initial transformation/ production GuardPoint .
-
Click on the Policy for the DFS Replication production GuardPoints created by pfmigrate utility. Note the DFS Replication policy name.
-
Unguard both the initial transformation and production GuardPoint for DFS Replication path. Wait for these GuardPoint s to be removed from the client.
-
Once both the initial transformation and production GuardPoints are removed, click **Create GuardPoint ** and select the DFS policy.
-
Provide the DFS production GuardPoint replication path, and the DFSPrivate folder path manually, in the path field in the Create GuardPoint dialog.
-
Wait for the GuardPoint s to become active on the file server. (It states Yes in the Enabled column.)
Changing the Access Policy for Linux
-
Click Access Policies.
-
Create an access policy group, (for ex: linux_migration_grp) with:
-
OS: Linux
-
Group: Access Control & Encryption
-
Default Access: Read/Write
-
-
The newly created access policy group will look like the following picture. This access policy group will be used for all of the rules. Change access policy group for the current rule with this newly created policy group. Apply changes and wait for rules to be applied at client.
-
On the CM, navigate to the corresponding CTE-U offline ({dxf} GuardPoint and enable it:
-
On CM, click Transparent Encryption.
-
Click Client on the relevant client name.
-
Click on ellipses for the GuardPoint and select Enable.
-
Allow sometime for CipherTrust Manager to enable the GuardPoint . When the status changes to Active, the GuardPoint is enabled.
Transforming Data in Linux
-
On Linux, use the
mount
command to confirm that the CipherTrust Transparent Encryption GuardPoint is overlaying the ProtectFile encrypted path. The following screenshot depicts how the CipherTrust Transparent Encryption GuardPoint is overlayed on the ProtectFile encrypted path. -
For file servers, login directly as root. Do not execute a switch user command before starting the data transformation.
-
Run the dataxform tool as follows:
dataxform -–rekey -–migrate --gp <GuardPoint>
For transformation to preserve the original timestamps, run it with the following additional option:
dataxform –-rekey --migrate --preserve_access_time –preserve_modified_time --gp <GuardPoint>
Note
The logs are stored in
/var/log/vormetric
. -
Exit the terminal which was used to run dataxform.
-
After the data transformation has completed, navigate to the corresponding Dataxform GuardPointon the CipherTrust Manager and disable it. Wait for the GuardPointto unmount on the file server.
-
For the encryption rule, navigate to the ProtectFile encryption rule on the CipherTrust Manager and disable it. Wait for the encryption rule to unmount on the file server.
-
For Access only rule, navigate to the ProtectFile encryption rule on the CipherTrust Manager and remove it. Wait for the rule to unmount on the file server.
-
Navigate to the corresponding production GuardPoint on CipherTrust Manager and enable it. Wait for the operation to finish. Verify that the CipherTrust Transparent Encryption GuardPoint is reapplied on the file server.
Note
If the Client is member of a ClientGroup, navigate to the corresponding production GuardPoint in the respective ClientGroup and enable it. Wait for the operation to finish. Verify that the CipherTrust Transparent Encryption GuardPoint is reapplied on the file server.
Post Migration
At this point, the migration for this encryption rule is completed. The data is converted to the CipherTrust Transparent Encryption format and the access rules are enforced. The encrypted path is now ready for production use.
-
Verify the integrity of the data for each ProtectFile encrypted path. Consult the CipherTrust Transparent Encryption product documentation for information on how to verify the data integrity.
Linux File Server: After data migration, close existing login sessions/terminals and then verify the integrity of the data for each protected path.
Windows File Server: After data migration, reboot the file server. Once the file server is rebooted, verify the integrity of the data for each protected path.
-
If you need to migrate other encryption rules immediately, do that now.
-
If you are not migrating any other encryption rules, make the full cluster nodes, and all of the NAS clients, active.
-
Repeat the steps for all encryption rules for the ProtectFile client.
-
Delete the ProtectFile client entry from the CipherTrust Manager once all of the rules are migrated to CTE.
-
On Windows ProtectFile clients, backup the registry.
-
Uninstall the ProtectFile software from the file server.
-
Take a backup of the CipherTrust Manager Configuration and the protected data now encrypted with CTE.
-
On Linux clients, backup the folder
/etc/vormetric
and save all of the logs in/var/log/vormetric
.
Note
CipherTrust Manager does not support offline mode so you cannot back up offline policies.
Note
Refer to the CTE Data Transformation Guide for more information.