If a Key Encryption Key (KEK) was specified when the Cloud VM Set was created, you may be able to change the properties for that KEK based on the options selected when the key was created.
Log into the KeyControl webGUI on any node in the cluster using an account with Cloud Admin privileges.
Click the Key Encryption Key tab. The options you can change are displayed as blue links in the webGUI.
Note: | If the Key State is Not Imported, then no KEK has been associated with this Cloud VM Set. To add one, see Importing a KEK for an Existing Cloud VM Set. |
Change any available option by clicking on the current value and then entering a new value in the field. When you are finished with each field, click Save in that field or your changes will be lost. KeyControl applies each change as soon as you click Save. While the change is in process, the Key State changes to ACTIVE_PENDING. When the change has been completed, the Key State returns to ACTIVE.
Option |
Description |
|||
---|---|---|---|---|
Key Expiration Period |
The length of time for which the KEK and all data encryption keys on the VMs will be valid. To indicate that the KEK should never expire, set this field to 0 (zero). If you change the Key Expiration Period, the new expiration period begins from the day you make the change, not from the day the Cloud VM Set was created. When this time period expires:
|
|||
Key Expiration Action |
The options are:
|
|||
Key Expiration Option |
The options are:
|
|||
VM Set Retention Period |
If Key Expiration Action is set to No Use, this field determines the period of time for which Cloud VM Set objects will be retained after the expiration date is reached. After this period passes, KeyControl permanently deletes all cloud VMs, the Cloud VM Set, and the associated KEK. |