Integration with CipherTrust Manager
This section lists the steps to integrate HPE StoreEver with CipherTrust Manager.
Prerequisites
This section provides the prerequisites for integration of HPE StoreEver with CipherTrust Manager.
Ensure that the CipherTrust Manager is installed and configured. For more details, refer to the CipherTrust Manager documentation.
HPE StoreEver communicates with the CipherTrust Manager using the KMIP interface. Ensure that the KMIP interface is configured on the CipherTrust Manager. Refer to CipherTrust Manager Administration Guide for details.
IP address of the CipherTrust Manager and port of the KMIP interface must be accessible from the HPE StoreEver system.
CipherTrust Manager recognizes only registered KMIP clients. Ensure that each node of the HPE StoreEver cluster is registered as a KMIP client on the CipherTrust Manager. Refer to KMIP Client Registration for more details.
Configuration on CipherTrust Manager
To configure the CipherTrust Manager, you need to perform the following steps:
Creating a Domain (Optional)
Perform the following steps on CipherTrust Manager:
Note
This step is optional and needs to be performed only if you want to integrate within a domain.
Navigate to Admin Settings > Domains.
Click Add Domain. The Add Domain page appears.
Specify the following information:
Name - Enter the domain name.
Admins - Select the admins (one or more) from the list available in the drop down. For example, admin.
Parent CA - Select parent CA as root CA.
Allow Subdomain User Management - Select this check box if you want to enable user management in the subdomain through this domain.
Click Save.
Click the current domain name at the top right corner to switch to the newly created domain.
Creating a User
To create a user, perform the following steps:
Log on to the CipherTrust Manager GUI.
Navigate to Access Management > Users.
On the Users page, click Add User.
On the Add User screen, provide the following details:
Full Name
Username
Email
Password
Password Match
For more information on creating a user depending on the selected connection type, refer to Managing Users.
Click Add User. The newly created user is listed on the Users page.
To create a user, perform the following steps:
Note
You can only create users in sub domains if you have enabled Allow Subdomain User Management while creating a domain.
Log on to the CipherTrust Manager GUI with the User you created within the Sub Domain.
Navigate to Access Management > Users.
On the Users page, click Create User.
On the Create User screen provide the following details:
Enter Username.
Enter Password.
Click Create. The newly created user is listed on the Users page.
Assigning User to a Group
Perform the following steps to add user to a group:
Navigate to Access Management > Users.
Select the required User from the list, the respective User details page appears.
Click GROUPS. On the search bar, enter the Key Admins or Key Users group depending on the level of access you want to grant to the user.
Click Add. User is now assigned to the selected Group .
Registering a KMIP Client
You can register a KMIP client on the CipherTrust Manager through:
Auto Registration
Manual Registration
Create a Registration Token using the following steps:
Log on to the CipherTrust Manager in the root domain.
Go to Access Management > Registration Tokens.
Click Add Registration Token.
Copy the Registration Token once it is created.
To enable Auto Registration perform the following steps:
Go to Admin Settings > Interfaces.
Select the desired KMIP interface from the list. The corresponding Interface Details page is displayed.
On the Interface Details page, select Auto Registration checkbox to enable Auto Registration.
Paste the
Registration Token
.Select the mode as TLS, verify client cert, user name taken from client cert, auth request is optional.
Click Update.
Log on to the CipherTrust Manager.
Go to Products > KMIP.
Create Client Profile using the following steps:
Go to Client Profile and click Add Profile.
Add a Profile Name.
Select CN in Username Location in Certificate.
Click Certificate Details.
Paste the content of
client.csr
.Click Save.
Create Registration Token using the following steps:
Navigate to Registration Tokens under Access Management and click Add Registration Token > Begin.
Add a Name Prefix.
Specify a Token Lifetime value along with Certificate Duration, and Client Capacity for the token.
Click Next. You can alternatively click Select CA to proceed further.
Select the CA Type as Local or External depending on the type of CA required.
Select the appropriate CA from the dropdown menu and click Select Profile.
Select the Client Profile from the dropdown which you have created in the above step.
Click Create Token.
Copy the value of the Token created and click Add Token.
Note
If you are using External CA then you can select the external CA which was created using openssl and uploaded on the CipherTrust Manager.
Go to Registered Clients and click Add Client.
Specify client name and paste the Registration Token generated in the above step.
Note
If you are using external CA then you need to paste the signed client certificate in the Client Certificate field.
Click Save to save the client certificate.
You can register a KMIP client on the CipherTrust Manager through:
Auto Registration
Manual Registration
Create a Registration Token in the sub-domain using the following steps:
Log on to the CipherTrust Manager in your specified subdomain.
Go to Access Management > Registration Tokens.
Click Add Registration Token > Begin.
Add a Name Prefix.
Specify a Token Lifetime value along with the Client Capacity for the token.
Copy the value of the Registration Token once it is created.
To enable Auto Registration perform the following steps:
Log on to the CipherTrust Manager in the root domain.
Go to Admin Settings > Interfaces.
Select the desired kmip interface from the list. The respective Interface Detail page appears.
elect Auto Registration.
Paste the
Registration Token
.Select the mode as TLS, verify client cert, user name taken from client cert, auth request is optional.
Click Update.
Log on to the CipherTrust Manager into your domain.
Go to Products > KMIP.
Create Client Profile using the following steps:
Go to Client Profile and click Add Profile.
Add a Profile Name.
Select CN in Username Location in Certificate.
Expand the Certificate Details section.
You can either paste the content of a generated client.csr or you can create one, by filling in the details.
In case of domains, the format to enter the Common Name field for the CSR is:
domainName||domainUser
Click Save.
Create a Registration Token using the following steps:
Go to Registration Token and click New Registration Token > Begin.
Add a Name Prefix.
Specify a Token Lifetime value along with the Client Capacity for the token.
Click Select CA.
Select the CA type as Local/External depending on what you are using.
Select the appropriate CA from the dropdown menu and click Select Profile.
Select the Client Profile from the dropdown which you have created in the above step.
Click Create Token.
Copy the value of the Token created and click Done.
If you are using External CA then you can select the external CA which was created using openssl and uploaded on the CipherTrust Manager.
Go to Registered Clients and click Add Client.
Specify client name and paste the Registration Token generated in the above step.
Note
If you are using external CA then you need to paste the signed client certificate in the Client Certificate field.
Click Save to save the client certificate.
Configuring the KMIP Interface
The KMIP interface can be configured through:
Go to Admin Settings > Interfaces.
On the KMIP Interface, click the ellipsis button (...) and then click View/Edit.
Select the Auto Registration checkbox if you auto-registered your KMIP client and paste the value of the registration token that you created.
Note
By default, Auto Registration is disabled.
Select the mode as TLS, verify client cert, user name taken from client cert, auth request is optional.
Specify selections for Local CA for Automatic Server Certificate Generation as desired.
Note
Local CA for Automatic Server Certificate Generation should be set to Turn off auto generation from Local CA in case of External CA.
Select the CA according to your preference:
If you are using External CA then select the CA under External Trusted CAs
If you are using Local CA then select the CA under Local Trusted CAs
If you are using an External CA, expand the Upload Certificate section:
In the Certificate field, paste the contents of Server Certificate, CA, and Server Key file in the same order. Do not introduce any space or character or symbol between the contents of these files.
Select certificate Format as PEM.
Password field is optional and can be skipped.
Click Update.
Switch to Root Domain.
Go to Admin Settings > Interfaces.
On the KMIP Interface, click the ellipsis button (...) and then click View/Edit.
Select the Auto Registration checkbox if you auto-registered your KMIP client and paste the value of the registration token that you created.
Note
By default, the Auto Registration is disabled.
Select the mode as TLS, verify client cert, user name taken from client cert, auth request is optional.
Specify selections for Local CA for Automatic Server Certificate Generation as desired.
Note
Local CA for Automatic Server Certificate Generation should be set to Turn off auto generation from Local CA in case of External CA.
Select the CA according to your preference.
Login to your sub-domain. Go to CA > Local. Click the ellipsis (...) and copy the contents of your CA Certificate.
Logout of your sub-domain and now login to the root domain.
Go to CA > External > Add External CA.
Enter a name for this Domain CA and select the text radio button and paste the certificate contents.
Click Add External CA.
Go to Admin Settings > Interfaces.
Click the Add icon to add the External CA.
Click Update.
Note
If you are using an External CA in the root Domain, you need to add the CA as an External CA in both the root domain as well as the sub-domain and modify the interface accordingly.
Go to Admin Settings > Interfaces.
Click the Add icon to add the External CA.
Click Update.
On the KMIP interface, click the ellipsis (...) > Certificate Options > Upload New Certificate > Ok.
Select the Certificate Chain option and click Build Certificate Chain.
Click on Text and paste the contents of Server Certificate, CA, and Server Key file in the same order. Do not introduce any space, character or symbol between the contents of these files.
Select certificate Format as PEM.
Click on Upload Certificate.
Configuration on HPE StoreEver
For the visual representation of the configuration steps on HPE StoreEver, refer to the GIF displayed below.
Perform the following steps to integrate HPE StoreEver with the CipherTrust Manager:
Log in to the StoreEver console as a security user.
Navigate to Configuration > Encryption > KMIP Wizard.
Click Next. The Certificate Authority Information screen displays prerequisites for using the KMIP certificate. When the prerequisites are met, click Next.
The Certificate Authority Certificate Entry screen displays instructions for obtaining the certificate for the KMIP server. Follow the instructions to copy the certificate from the management console. Paste the certificate into the wizard and then click Next.
The Library Certificate Information screen displays information about the next wizard steps. Click Next.
The KMIP Client Configuration screen provides options for two types of server authentication.
When the KMIP server uses a client username and password for authentication, enter the username and password that were specified on the KMIP management console for the library.
When the KMIP server uses only certificate passing for authentication, select Enable KMIP Certificate-only authentication.
Note
Select Enable KMIP Certificate-only authentication option only if it is required and a client's username and password is not available.
Click Next.
The Certificate Generation screen displays the current library certificate, if one exists.
To use the current certificate, select Keep Current Certificate and then click Next.
To generate a new certificate, select Generate New Certificate. The wizard will generate and display a new library certificate. Click Select Certificate to copy the new certificate text and then click Next.
When selected Generate New Certificate, the Sign Library Certificate screen displays the new certificate for the library. Sign the new library certificate with the certificate authority as a client certificate, paste the new KMIP certificate in the box, and then click Next.
On the KMIP Server Configuration page, enter the IP address or fully-qualified hostname and port number for up to ten KMIP servers. To verify access to the KMIP servers, click Connectivity Check.
The Setup Summary screen displays the settings that were collected by the wizard. Verify that the settings are correct and that there are no errors in the Done column. To modify any settings or fix any issues, either click Back to reach the applicable screen or cancel out of the wizard to fix the issues and return later.
If the settings are correct and there are no errors, click Finish.On the Configuration page, under the Set Default Encryption Mode for new Partitions section, select KMIP (Licensed) from the dropdown menu and Click Apply to all existing partitions to configure partitions for use with KMIP, and then click Next.