<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Real example on using Safenet/KeySecure to encrypt NetApp data in ONTAP Discussions</title>
    <link>https://community.netapp.com/t5/ONTAP-Discussions/Real-example-on-using-Safenet-KeySecure-to-encrypt-NetApp-data/m-p/3357#M678</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David,&lt;/P&gt;&lt;P&gt;Could you please forward manuals,like user's guides on 2 Administrative Interfaces: Management Console and Command Line Interfaces?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 17 Jan 2014 20:34:01 GMT</pubDate>
    <dc:creator>netappmagic</dc:creator>
    <dc:date>2014-01-17T20:34:01Z</dc:date>
    <item>
      <title>Real example on using Safenet/KeySecure to encrypt NetApp data</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/Real-example-on-using-Safenet-KeySecure-to-encrypt-NetApp-data/m-p/3346#M672</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have read a document about what Safenet/Keysecure is in general. However, still not so clear on how to use it in real life. Can anybody please show me some real administration tasks and configurations, how data will get encrypted by using KeySecure? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2025 05:45:41 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/Real-example-on-using-Safenet-KeySecure-to-encrypt-NetApp-data/m-p/3346#M672</guid>
      <dc:creator>netappmagic</dc:creator>
      <dc:date>2025-06-05T05:45:41Z</dc:date>
    </item>
    <item>
      <title>Re: Real example on using Safenet/KeySecure to encrypt NetApp data</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/Real-example-on-using-Safenet-KeySecure-to-encrypt-NetApp-data/m-p/3351#M675</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;Hi !&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;Thank you for your question.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;SafeNet and NetApp have partnered for many years to provide full lifecycle key management to NetApp NSE and Encryption and Key Management for NetApp NAS customers. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;High-level points about how SafeNet supports the NetApp NSE products are:&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif';"&gt;Supports the entire suite of storage efficiency technologies from NetApp, including deduplication, compression, and array-based AV scanning&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif';"&gt;Supports the SafeNet KeySecure encryption-key appliance, strengthening and simplifying long-term key management.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif';"&gt;Helps you comply with FISMA, HIPAA, PCI, Basel II, SB 1386, and E.U. Data Protection Directive 95/46/EC regulations using FIPS 140-2 validated hardware &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif';"&gt;KeySecure complies with the OASIS KMIP standard, offering compatibility with other&amp;nbsp; encryption devices and end points&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;Some basic administrative topics covered below. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;STRONG style="color: black; font-size: 10.0pt; font-family: 'Arial','sans-serif';"&gt;Options for creating grouping of keys for purposes of automation and management&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;A user directory contains a list of users that may access the keys on your Key Server, and a list of groups to which those users belong. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;The Key Server can use one of two user directories:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #5e5e5c;"&gt;&lt;STRONG&gt;• &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;A local user directory, where users and groups are defined only on the local device and are not available to any other KeySecure.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #5e5e5c;"&gt;&lt;STRONG&gt;• &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;A central server running the Lightweight Directory Access Protocol (LDAP), which enables all devices to access, the same set of users and groups. If you have several KeySecures in use, LDAP can greatly simplify user and group administration.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;The Key Server can either use local user or group authentication or LDAP authentication.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;&lt;STRONG&gt;Types of key polices&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;An authorization policy enables you to limit how a user group may use a key. On the KeySecure you implement an authorization policy when establishing a key’s group permissions. The policies are applied to a key separately for each group; groups that share a key do not necessarily share the same authorization policy.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;Rate Limits: The number of operations (per hour) that members of the group can perform. The default is unlimited operations. If a user attempts to perform an operation and has exceeded the rate limit, an error is returned and the connection is closed.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;Time Limits: The hours or days in which members of the group can perform operations. The default is unlimited access. If a member of a restricted group attempts to use the key outside of the designated time, an error is returned and the connection is closed.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: black; font-size: 10pt; font-family: 'Arial','sans-serif';"&gt;Key lifecycle management tasks supported/automated&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;KeySecure simplifies the management of encryption keys across the entire lifecycle including secure key generation, storage and backup, key distribution and key deactivation and deletion.&amp;nbsp; KeySecure makes automated, policy driven operations easy for tasks such as key expiry and key rotation.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;The Key Management Interoperability Protocol (KMIP) is used to transmit key management requests from clients to the KeySecure. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;KMIP clients are able to submit the following requests.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;UL style="list-style-type: disc;"&gt;&lt;LI&gt;&lt;SPAN style="color: black;"&gt;Activate&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: black;"&gt;AddAttribute&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: black;"&gt;Create&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: black;"&gt;CreateKeyPair&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: black;"&gt;DeleteAttribute&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: black;"&gt;Destroy&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: black;"&gt;Get&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: black;"&gt;GetAttributes&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: black;"&gt;GetAttributeList&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: black;"&gt;Locate&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: black;"&gt;ModifyAttribute&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: black;"&gt;Query&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: black;"&gt;Register&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;Revoke&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;The KeySecure currently supports the following managed objects: certificates, private keys, public keys, templates, secret data, and symmetric keys.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;STRONG style="color: black; font-size: 10.0pt; font-family: 'Arial','sans-serif';"&gt;Administrative Interfaces&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;Management Console &lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;- The management console is a graphic user interface that enables you to perform remote administration using a web browser. The web browser used to connect to the Management Console must be capable of high-grade 128-bit encryption. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;Command Line Interface &lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;- The command line interface (CLI) enables you to perform administrative functions either at the KeySecure serial console or remotely using SSH.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Links to NetApp resources for SafeNet solutions can be found at:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.netapp.com/us/products/storage-security-systems/netapp-storage-encryption.aspx" title="http://www.netapp.com/us/products/storage-security-systems/netapp-storage-encryption.aspx" target="_blank"&gt;http://www.netapp.com/us/products/storage-security-systems/netapp-storage-encryption.aspx&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="http://www.netapp.com/us/products/storage-security-systems/key-management/keysecure/index.aspx" title="http://www.netapp.com/us/products/storage-security-systems/key-management/keysecure/index.aspx" target="_blank"&gt;http://www.netapp.com/us/products/storage-security-systems/key-management/keysecure/index.aspx&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="http://www.netapp.com/us/system/pdf-reader.aspx?pdfuri=tcm:10-113008-16&amp;amp;m=tr-4074.pdf" title="http://www.netapp.com/us/system/pdf-reader.aspx?pdfuri=tcm:10-113008-16&amp;amp;m=tr-4074.pdf" target="_blank"&gt;http://www.netapp.com/us/system/pdf-reader.aspx?pdfuri=tcm:10-113008-16&amp;amp;m=tr-4074.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.netapp.com/us/products/storage-security-systems/storagesecure-encryption/index.aspx" title="http://www.netapp.com/us/products/storage-security-systems/storagesecure-encryption/index.aspx" target="_blank"&gt;http://www.netapp.com/us/products/storage-security-systems/storagesecure-encryption/index.aspx&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;SafeNet resources for KeySecure can be found at;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="http://www.safenet-inc.com/data-protection/key-management/key-secure/" title="http://www.safenet-inc.com/data-protection/key-management/key-secure/" target="_blank"&gt;http://www.safenet-inc.com/data-protection/key-management/key-secure/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.safenet-inc.com/data-protection/keysecure-netapp-interoperability/" title="http://www.safenet-inc.com/data-protection/keysecure-netapp-interoperability/" target="_blank"&gt;http://www.safenet-inc.com/data-protection/keysecure-netapp-interoperability/&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Jan 2014 17:12:00 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/Real-example-on-using-Safenet-KeySecure-to-encrypt-NetApp-data/m-p/3351#M675</guid>
      <dc:creator>davidberman</dc:creator>
      <dc:date>2014-01-16T17:12:00Z</dc:date>
    </item>
    <item>
      <title>Re: Real example on using Safenet/KeySecure to encrypt NetApp data</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/Real-example-on-using-Safenet-KeySecure-to-encrypt-NetApp-data/m-p/3357#M678</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David,&lt;/P&gt;&lt;P&gt;Could you please forward manuals,like user's guides on 2 Administrative Interfaces: Management Console and Command Line Interfaces?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Jan 2014 20:34:01 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/Real-example-on-using-Safenet-KeySecure-to-encrypt-NetApp-data/m-p/3357#M678</guid>
      <dc:creator>netappmagic</dc:creator>
      <dc:date>2014-01-17T20:34:01Z</dc:date>
    </item>
  </channel>
</rss>

