© 2009 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice KMIP Key Naming for Removable Media.

Slides:



Advertisements
Similar presentations
MySQL Access Privilege System
Advertisements

Tape Encryption Why is it needed? Tape backup software is given access to all data on the system. Tapes are taken off site to a data vault for “security”
©2009 HP Confidential1 Proposal to OASIS KMIP TC Stan Feather and Indra Fitzgerald Hewlett-Packard Co. 10 September, 2010 Encoding Options for Key Wrap.
Key Wrapping in KMIP Mark Joseph, P6R Inc 2/27/2015.
C++ How to Program, 7/e © by Pearson Education, Inc. All Rights Reserved.
KMIP Vendor Extension Management KMIP supports ‘extensions’ but provides no mechanism for coordination of values between clients and servers or between.
Athabasca University Under Development for COMP 200 Gary Novokowsky
14 Templates. OBJECTIVES In this chapter you will learn:  To use function templates to conveniently create a group of related (overloaded) functions.
Key Management Interoperability Protocol By: Derrick Erickson.
MIS 431 Chapter 71 Ch. 7: Advanced File Management System MIS 431 Created Spring 2006.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Verify the quality and.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Anywhere Defect.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Ensure geographical redundancy.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
QAD .Net UI: New Enhancements
Configuration Management Supplement 67 Robert Horn, Agfa Healthcare.
Unicenter Desktop & Server Management Network Challenges -Latest Revision 11/28/2005.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Automatically control.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Common Proximity Card.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Terminology Crowdsourcing.
© Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Buying factors – HP.
Installing Microsoft Windows Server 2008 Lesson 2.
Datacenter Care Presenter Name: Date:.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. How to use the Scoping.
SNIA/SSIF KMIP Interoperability Proposal. What is the proposal? Host a KMIP interoperability program which includes: – Publishing a set of interoperability.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential Document.
C++ How to Program, 8/e © by Pearson Education, Inc. All Rights Reserved. Note: C How to Program, Chapter 22 is a copy of C++ How to Program Chapter.
© 2010 IBM Corporation 23 September 2015 KMIP Server-to-server: use-cases and status Marko Vukolic Robert Haas
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Self-guided tour Framework.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Introduction to HP Availability Manager.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
Group Kiran Thota, VMware Saikat Saha, Oracle. What is Group? Group can be defined as a logical collection or container of objects – Managed Objects –
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice HP Library Encryption - LTO4 Key.
KMIP 1.3 Deprecation February 20, Deprecation 5.1 KMIP Deprecation Rule Items in the normative KMIP Specification [KMIP-Spec] document can be marked.
C++ How to Program, 9/e © by Pearson Education, Inc. All Rights Reserved.
Chapter 6 Introduction to Defining Classes. Objectives: Design and implement a simple class from user requirements. Organize a program in terms of a view.
1 NIST Key State Models SP Part 1SP (Draft)
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential Level.
Name Resolution in Network Management A Quick Look at the Aspects of Naming and Name Resolution.
KMIP Support for PGP Things to take out Things to put in.
Constraints Lesson 8. Skills Matrix Constraints Domain Integrity: A domain refers to a column in a table. Domain integrity includes data types, rules,
© Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted Module 7.
© 2005 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Secure Path for HP- UX v3.0F Mary.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. FY13 Software IT Performance.
© Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted Module 8.
IEEE P Architecture Subcommittee Model Update and Discussion November 1, 2007.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP StorageWorks LTO Ultrium Tape.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Lesson # 8 HP UCMDB 8.0 Essentials.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. OMi CiGenerator tool this.
©2009 HP Confidential1 Proposal to OASIS KMIP TC Stan Feather and Indra Fitzgerald Hewlett-Packard Co. 23 September, 2010 Encoding Options for Key Wrap.
©2009 HP Confidential1 Proposal to OASIS KMIP TC Stan Feather and Indra Fitzgerald Hewlett-Packard Co. 26 October, 2010 Encoding Options for Key Wrap of.
KMIP PKCS#12 February 2014 Tim Hudson – 1.
© 2003 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Industry Standard Server Support.
Portable Symmetric Key Container (PSKC) Mingliang Pei Philip Hoyer Dec. 3, th IETF, Vancouver.
Chapter 18 Introduction to Custom Templates C++ How to Program, 9/e ©2016 by Pearson Education, Inc., Hoboken, NJ. All Rights Reserved. Instructor Note:
Locate By Value Anthony Berglas. Basic Idea To extend Locate so that it queries managed object’s values (KeyBlock) in the same way that it can now be.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Getting to Blue Carpet.
Chapter 4: server services. The Complete Guide to Linux System Administration2 Objectives Configure network interfaces using command- line and graphical.
1 Key Management Interoperability Protocol (KMIP) Bob Griffin co-chair, KMIP TC
Introduction to Classes and Objects CS-2303, C-Term C++ Program Structure Typical C++ Programs consist of:– main –A function main –One or more classes.
Gartner Magic Quadrants
Encapsulation, Data Hiding and Static Data Members
Chapter 14 Templates C++ How to Program, 8/e
KMIP Client Registration Ideas for Discussion
Wheat vs Chaff February, 2019.
IPP Job Storage 2.0: Fixing JPS2
Task 62 Scope – Config / Operational State
Presentation transcript:

© 2009 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice KMIP Key Naming for Removable Media Interchange Stan Feather. HP StorageWorks 29 April, Version 1.0

OASIS KMIP Key Naming for Storage Media Interchange Use Cases and Problem Statement Visibility Proposal Outline

OASIS KMIP Key Naming for Storage Media Interchange Use Cases and Problem Statement Use Case. −Interchange encrypted media between multi-vendor storage systems Conditions. −Media interchange exists normally – without encryption −Encryption was transparent to host software −Keys created by each vendor’s solution are stored on a KMIP key server Problem Statement. Multi-vendor interchange breaks when media is encrypted, even though keys are stored on a KMIP key server.

OASIS KMIP Key Naming for Storage Media Interchange Visibility of Issue Currently, the issue is not visible −Keys are stored on separate servers. No interchange is possible Issue will become visible after KMIP −Multi-vendor clients will store keys on KMIP server −Each vendor’s KMIP client, or an admin, will create named keys −Key names are currently vendor unique −Even with KMIP, multi-vendor media interchange will remain broken

OASIS KMIP Key Naming for Storage Media Interchange Outline of HP’s Proposal Propose adding a key attribute to assist clients resolve the key’s name. −Un-correlated. (default value). The key is not used in removable media applications. Or, none of the keys’s names correlate to key name(s) stored on the removable media. −Simple correlation. One or more of the key’s names is also stored on the media. The media and the server copies of the name can be matched by simple string compare. −Public correlation algorithm. The server and media copies of the key name can only be matched using a publicly accessible algorithm. The definition and use of these algorithms is outside the scope of KMIP. The definition may specify a key attribute to identify the specific algorithm. −Private correlation algorithm. The server and media copies of the key name can only be matched using a private algorithm. The key may not be accessible in multi-vendor configurations. Propose addition to the the KMIP usage guide to explain use cases for the name- resolution attribute