DL4300 Appliance
Managing encryption keys
105
The Protected Machines page appears, listing all the machines protected by this Core. An open lock
appears for any machine that does not have an encryption key applied. A closed lock
indicates that a
protected machine has encryption applied.
2.
In the Protected Machines pane, click the
Encrypted icon for the protected machine you want to
configure.
The Encryption Configuration dialog box appears.
3. Select Encrypt data using Core-based encryption with an existing Key, and from the drop-down menu,
select (None) and then click OK.
4. If you want to remove this encryption key from the Rapid Recovery Core, first repeat this procedure for
all protected machines using this key. Then perform the procedure described in the topic
Parent topic
Managing encryption keys
To manage encryption keys for the Rapid Recovery Core, from the icon bar, click (More) and then select
Encryption Keys. The Encryption Keys page appears. For each encryption key added to your Rapid Recovery
Core (if any have been defined yet), you see the information described in the following table.
Table 35. Information about each encryption key
UI Element
Description
Select Item
For each encryption key, you can select the
checkbox to perform actions from the list of menu
options above the table.
Name
The name associated with the encryption key.
Thumbprint
This parameter is a 26-character alphabetic string of
randomly generated English upper and lower case
letters that helps uniquely identify each encryption
key.
Type
Type describes the origin point of an encryption key
and its ability to be applied. An encryption key can
contain one of two possible types:
Universal. Universal type is the default condition
when you create an encryption key. A key with
a type of Universal, combined with a state of
Unlocked, indicates that the key can be applied to
a protected machine. You cannot manually lock a
universal key type; instead, you must first change
its type as described in the procedure
.
Replication. When a protected machine in a source
Core has encryption enabled, and recovery points
for that machine are replicated in a target Core,
any encryption keys used in the source appear
automatically in the target Core with a type of
Replication. The default state after receiving