Skip to main content
A newer release of this product is available.

Add a key management server (KMS)

Contributors netapp-lhalbert netapp-maireadn netapp-madkat

You use the StorageGRID Key Management Server wizard to add each KMS or KMS cluster.

Before you begin
About this task

If possible, configure any site-specific key management servers before configuring a default KMS that applies to all sites not managed by another KMS. If you create the default KMS first, all node-encrypted appliances in the grid will be encrypted by the default KMS. If you want to create a site-specific KMS later, you must first copy the current version of the encryption key from the default KMS to the new KMS. See Considerations for changing the KMS for a site for details.

Step 1: KMS details

In Step 1 (KMS details) of the Add a Key Management Server wizard, you provide details about the KMS or KMS cluster.

Steps
  1. Select CONFIGURATION > Security > Key management server.

    The Key management server page appears with the Configuration details tab selected.

  2. Select Create.

    Step 1 (KMS details) of the Add a Key Management Server wizard appears.

  3. Enter the following information for the KMS and the StorageGRID client you configured in that KMS.

    Field Description

    KMS name

    A descriptive name to help you identify this KMS. Must be between 1 and 64 characters.

    Key name

    The exact key alias for the StorageGRID client in the KMS. Must be between 1 and 255 characters.

    Note: If you haven't created a key using your KMS product, you'll be prompted to have StorageGRID create the key.

    Manages keys for

    The StorageGRID site that will be associated with this KMS. If possible, you should configure any site-specific key management servers before configuring a default KMS that applies to all sites not managed by another KMS.

    • Select a site if this KMS will manage encryption keys for the appliance nodes at a specific site.

    • Select Sites not managed by another KMS (default KMS) to configure a default KMS that will apply to any sites that don't have a dedicated KMS and to any sites you add in subsequent expansions.

      Note: A validation error will occur when you save the KMS configuration if you select a site that was previously encrypted by the default KMS but you did not provide the current version of original encryption key to the new KMS.

    Port

    The port the KMS server uses for Key Management Interoperability Protocol (KMIP) communications. Defaults to 5696, which is the KMIP standard port.

    Hostname

    The fully qualified domain name or IP address for the KMS.

    Note: The Subject Alternative Name (SAN) field of the server certificate must include the FQDN or IP address you enter here. Otherwise, StorageGRID will not be able to connect to the KMS or to all servers in a KMS cluster.

  4. If you are configuring a KMS cluster, select Add another hostname to add a hostname for each server in the cluster.

  5. Select Continue.

Step 2: Upload server certificate

In Step 2 (Upload server certificate) of the Add a Key Management Server wizard, you upload the server certificate (or certificate bundle) for the KMS. The server certificate allows the external KMS to authenticate itself to StorageGRID.

Steps
  1. From Step 2 (Upload server certificate), browse to the location of the saved server certificate or certificate bundle.

  2. Upload the certificate file.

    The server certificate metadata appears.

    Note If you uploaded a certificate bundle, the metadata for each certificate appears on its own tab.
  3. Select Continue.

Step 3: Upload client certificates

In Step 3 (Upload client certificates) of the Add a Key Management Server wizard, you upload the client certificate and the client certificate private key. The client certificate allows StorageGRID to authenticate itself to the KMS.

Steps
  1. From Step 3 (Upload client certificates), browse to the location of the client certificate.

  2. Upload the client certificate file.

    The client certificate metadata appears.

  3. Browse to the location of the private key for the client certificate.

  4. Upload the private key file.

  5. Select Test and save.

    If a key doesn't exist, you are prompted to have StorageGRID create one.

    The connections between the key management server and the appliance nodes are tested. If all connections are valid and the correct key is found on the KMS, the new key management server is added to the table on the Key Management Server page.

    Note Immediately after you add a KMS, the certificate status on the Key Management Server page appears as Unknown. It might take StorageGRID as long as 30 minutes to get the actual status of each certificate. You must refresh your web browser to see the current status.
  6. If an error message appears when you select Test and save, review the message details and then select OK.

    For example, you might receive a 422: Unprocessable Entity error if a connection test failed.

  7. If you need to save the current configuration without testing the external connection, select Force save.

    Caution Selecting Force save saves the KMS configuration, but it does not test the external connection from each appliance to that KMS. If there is an issue with the configuration, you might not be able to reboot appliance nodes that have node encryption enabled at the affected site. You might lose access to your data until the issues are resolved.
  8. Review the confirmation warning, and select OK if you are sure you want to force save the configuration.

    The KMS configuration is saved but the connection to the KMS is not tested.