Configuring a new Multi-Tenant KMIP Server

Beginning with KeyControl Vault 5.5, all fresh 5.5 installations contain Multi-Tenant KMIP.

Any KMIP client can connect to the multi-tenant KeyControl Vault KMIP server and perform all standard KMIP operations with the following restrictions:

  • The KeyControl Vault KMIP server supports KMIP versions 1.0, 1.1,1.2,1.3,1.4, 2.0, 2.1, and 3.0. The KMIP server protocol version is configured automatically and set between 1.0 to 3.0, as requested by the client.
  • Object count (for example, keys) is limited to 1 million KMIP objects per KeyControl Vault cluster. After this limit, the KMIP server will still create and maintain the objects but the KeyControl webGUI may not display those objects correctly.
  • KMIP users and clients and can be grouped into tenants and they will have access to only KMIP objects that are part of the tenant.

Important: KeyControl Vault includes a component for creating a Root Certificate Authority (CA) that can generate digital certificates. When the first KeyControl Vault node is installed, it creates a Public CA that it also stores in the KeyControl Vault object store. For more information, see KeyControl Vault Certificates.
By default, the KMIP server uses a default certificate signed by the CA inside KeyControl Vault. This can be changed by installing a custom SSL certificate for the KMIP server. To generate a custom SSL certificate, you can use a CSR created from KeyControl Vault for the KMIP server (see Creating a Certificate Signing Request for KMIP Server) or you can use your own CSR. If you use your own CSR, you must upload a private key for that custom certificate.

For details about the standard KMIP operations and configuration settings, see the Oasis KMIP Technical Committee page or the KMIP wikipedia page.

When a KMIP client connects to the KeyControl Vault KMIP server, the client must use the certificates associated with a KMIP server user account. The KeyControl Vault KMIP server does not support username/password login credentials. For details about downloading a user account certificate bundle, see Creating KMIP Client Certificate Bundles.

Note:  

  • If you are configuring a KMIP server to use with VMware vSphere encryption or VSAN encryption, see the Entrust KeyControl with VMware VSAN and vSphere VM Encryption guide.
  • If you are using a KMIP server with KEK enabled, please ensure that the KEK cache timeout is enabled. Set the value to anything other than 0.

Procedure

  1. Log into the KeyControl webGUI using an account with Security Admin privileges.
  2. In the top menu bar, click KMIP.
  3. On the Settings tab, specify the options you want to use.

  4. When you are finished, click Apply.
  5. At the prompt, click Proceed to confirm the configuration. If this server was already enabled, KeyControl Vault restarts it and refreshes its object list.

What to Do Next 

Create new KMIP tenant and create one or more certificates bundles that clients can use to connect to KMIP server. For details, see Creating a KMIP Tenant and Managing KMIP Tenant Client Certificates.