If a Cloud VM Set was created with an associated Key Encryption Key (KEK) but the Base64 encoded key was not specified at the time of creation, you need to import one before you can register VMs with the Cloud VM Set.
KeyControl creates the KEK based on a user-provided 128- or 256-bit encoded key and stores the KEK in an associated hardware security module (HSM).
Before You Begin
Make sure there is an HSM associated with this KeyControl cluster. For details, see Hardware Security Modules with KeyControl.
Procedure
Log into the KeyControl webGUI on any node in the cluster using an account with Cloud Admin privileges.
Select Actions > Import Key Encryption Key and specify the options you want to use.
Option |
Description |
|||
---|---|---|---|---|
Base64 Encoded Key |
The encryption key KeyControl should use to encrypt all data encryption keys for all VMs in the Cloud VM Set. The expiration option settings for this KEK are automatically inherited by all VMs registered with the Cloud VM Set. Specify the base64-encoded value for a 128-bit or 256-bit key. KeyControl stores the KEK in the associated HSM when you submit the import request. |
|||
Key Expiration Period |
The length of time for which the KEK and all data encryption keys on the VMs will be valid. To indicate that the KEK should never expire, set this field to 0 (zero). If you change the Key Expiration Period, the new expiration period begins from the day you make the change, not from the day the Cloud VM Set was created. When this time period expires:
|
|||
Key Expiration Action |
The options are:
|
|||
Key Expiration Option |
The options are:
|
|||
VM Set Retention Period |
If Key Expiration Action is set to No Use, this field determines the period of time for which Cloud VM Set objects will be retained after the expiration date is reached. After this period passes, KeyControl permanently deletes all cloud VMs, the Cloud VM Set, and the associated KEK. |