Chat now with support
Chat mit Support

Rapid Recovery 6.8 - User Guide

Introduction to Rapid Recovery The Core Console Repositories Core settings Protecting machines
About protecting machines with Rapid Recovery Understanding the Rapid Recovery Agent software installer Deploying Agent to multiple machines simultaneously from the Core Console Using the Deploy Agent Software Wizard to deploy to one or more machines Modifying deploy settings Understanding protection schedules Protecting a machine About protecting multiple machines Enabling application support Settings and functions for protected Exchange servers Settings and functions for protected SQL servers
Managing protected machines Snapshots and recovery points Managing privacy Encryption Authentication Replication Events Reporting VM export Restoring data Bare metal restore
About bare metal restore Differences in bare metal restore for Windows and Linux machines Understanding boot CD creation for Windows machines Managing a Linux boot image Performing a bare metal restore using the Restore Machine Wizard Using the Universal Recovery Console for a BMR Performing a bare metal restore for Linux machines Verifying a bare metal restore
Managing aging data Archiving Cloud accounts Core Console references REST APIs Glossary

Removing an encryption key

When you remove an encryption key from the Encryption Keys page, the key is deleted from the Rapid Recovery Core.

NOTE: Removing an encryption key does not decrypt the recovery points already saved using the key. You must still retain and provide the passphrase for the key to recover data for existing encrypted recovery points.

You cannot remove an encryption key that is already associated with any protected machine. You must first view the encryption settings for each protected machine using the key, and disassociate the encryption key you want to remove. For more information, see the topic Disassociating an encryption key from a protected machine.

Complete the steps in this procedure to remove an encryption key.

  1. Navigate to the Rapid Recovery Core Console.
  2. On the icon bar, click [More] (More) and then select Encryption Keys.
    The Encryption Keys page appears.
  3. Locate the encryption key you want to remove. Click its drop-down menu [More], and select Remove.
    The Remove Encryption Key dialog box appears. You see a message confirming the action to remove the encryption key.
  4. In the dialog box, confirm that you want to remove the encryption key.

    NOTE: Removing an encryption key does not decrypt the recovery points already saved using the key. You must still retain and provide the key to recover data for existing encrypted recovery points.

    The dialog box closes, and the encryption key you removed no longer appears on the Encryption Keys page.

Changing encryption key types

Encryption keys list one of two possible types on the Encryption Keys pane: Universal or Replication. The type indicates the likely origin of the encryption key, and determines whether you can change its details or passphrase. You can modify these attributes only if the type is Universal. If you need to modify these attributes for a key with Replicated type, you must change its type to Universal using this procedure. When you change the type of an encryption key to Universal, it is unlocked manually and can be used to encrypt other protected machines.

NOTE: You must know the passphrase to change the type from Replicated to Universal.

Encryption keys also have two possible states: Locked or Unlocked. The state controls your ability to apply an encryption key to a protected machine, or to restore data from a recovery point with encryption. You can change the type of an encryption key manually only if the state is Unlocked.

When you first create an encryption key, its type is Universal, and its state is Unlocked. You can use such a key immediately (for example, to encrypt backups for a protected machine). However, a Universal key type cannot be locked manually. If you want to manually lock an encryption key with a type of Universal, you must change the type to Replicated using this procedure.

You cannot change an encryption key type if it is already in use encrypting recovery points for one or more protected machine.

Follow this procedure to change an encryption key type.

  1. Navigate to the Rapid Recovery Core Console.
  2. On the icon bar, click [More] (More) and then select Encryption Keys.
    The Encryption Keys page appears. Any encryption keys accessible to the Core appear in a summary table. Each lists a type of Universal or Replicated.
  3. Locate the encryption key you want to update.
  4. If you want to change a Universal encryption key to Replication, do the following:
    1. Click its drop-down menu [More], and select Change the type to Replicated.
      The Change Encryption Key Type dialog box appears. You see a message confirming that you want to change the type to Replicated.
    2. In the dialog box, confirm that you want to change the type to Replication.
      The dialog box closes, and the encryption key type updates to Replication.
  5. If you want to change a Replication encryption key to Universal, do the following:
    1. Click its drop-down menu [More], and select Change the type to Universal
      The Change Encryption Key Type dialog box appears. You see a message confirming that you want to change the type to Universal.
    2. In the dialog box, in the Passphrase text box, enter the passphrase and then click OK to confirm that you want to change the type to Universal.
      The dialog box closes, and the encryption key type updates to Universal.

Authentication

This section describes the two options available for logging in to the Rapid Recovery Core Console.

Topics include:

Understanding SAML single sign-on

Rapid Recovery offers the ability to link a single sign-on identity provider (IdP), to the Rapid Recovery Core using the SAML 2.0 protocol. Use of this feature is optional. Rapid Recovery supports only service provider-initiated login.

To configure Rapid Recovery for SAML, see Configuring SAML settings.

Prerequisite

Before you configure the SAML feature, establish an account with one of the following compatible IdPs:

  • MIcrosoft Azure Active Directory (Azure AD)
  • Okta
  • OneLogin

For more information, see the white paper Configuring SAML single sign-on authentication for Quest Rapid Recovery and the documentation provided by your IdP.

Verwandte Dokumente

The document was helpful.

Bewertung auswählen

I easily found the information I needed.

Bewertung auswählen