Encryption keys may contain a state of unlocked or locked. An unlocked encryption key can be applied to a protected machine to secure the backup data saved for that machine in the repository. From a Rapid Recovery Core using an unlocked encryption key, you can also recover data from a recovery point.
When you import an encryption key into a Rapid Recovery Core, its default state is Locked. This is true regardless of whether you explicitly imported the key, or whether the encryption key was added to the Rapid Recovery Core either by replicating encrypted protected machines or by importing an archive of encrypted recovery points.
For encryption keys added to the Rapid Recovery Core by replication only, when you unlock a key, you can specify a duration of time (in hours, days, or months) for the encryption key to remain unlocked. Each day is based on a 24-hour period, starting from the time the unlock request is saved to the Rapid Recovery Core. For example, if the key is unlocked at 11:24 AM on Tuesday and the duration selected is 2 days, the key automatically re-locks at 11:24 AM that Thursday.
|
NOTE: You cannot use a locked encryption key to recover data or to apply to a protected machine. You must first provide the passphrase, thus unlocking the key. |
You can also lock an unlocked encryption key, ensuring that it cannot be applied to any protected machine until it is unlocked. To lock an encryption key with a state of Universal, you must first change its type to Replicated.
If an unlocked encryption key is currently being used to protect a machine in the Core, you must first disassociate that encryption key from the protected machine before you can lock it.
Complete the steps in this procedure to unlock a locked encryption key.
The Unlock Encryption Key dialog box appears.
This option is available for encryption keys added by replication.
The dialog box closes and the changes for the selected encryption key are visible on the Encryption Keys page.
This option is available for encryption keys added by replication.
The dialog box closes and the changes for the selected encryption key are visible on the Encryption Keys page.
When an encryption key state is locked, it cannot be applied to any protected machine until it is unlocked. To lock an encryption key with a type of Universal, you must first change its type to Replicated.
Complete the steps in this procedure to lock an encryption key.
The Lock Encryption Key dialog box appears.
The dialog box closes, and the state of the selected encryption key is now locked.
|
NOTE: This option is available for encryption keys added by replication. |
After an encryption key is defined, you can edit the name of the encryption key or the description of the key. These properties are visible when you view the list of encryption keys in the Encryption Keys pane.
Complete the steps in this procedure to edit the name or description of an existing unlocked encryption key.
|
Caution: After you edit the name or description an encryption key that is used to protect one or more machines, Rapid Recovery takes a new base image. That base image snapshot occurs for that machine upon the next scheduled or forced snapshot. |
The Edit Encryption Key dialog box appears.
The dialog box closes, and the changes for the selected encryption key are visible on the Encryption Keys page.
To maintain maximum security, you can change the passphrase for any existing encryption key. Complete the steps in this procedure to change the passphrase for an encryption key.
|
Caution: After you edit the name or description an encryption key that is used to protect one or more machines, Rapid Recovery takes a new base image. That base image snapshot occurs for that machine upon the next scheduled or forced snapshot. |
|
Caution: Rapid Recovery uses AES 256-bit encryption in the Cipher Block Chaining (CBC) mode with 256-bit keys. Quest recommends that you record the passphrase in a secure location and keep this information updated. Quest Data Protection Support cannot recover a passphrase. Without the passphrase, you cannot recover information from encrypted recovery points. |
© 2024 Quest Software Inc. ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center