This article describes how to use Fortanix Data Security Manager (DSM) to encrypt Veritas NetBackup storage.
2.0 Fortanix Data Security Manager
Fortanix DSM is the world's first cloud solution secured with Intel® SGX. With Fortanix DSM, you can securely generate, store, and use cryptographic keys and certificates, and secrets, such as passwords, API keys, tokens, or any blob of data.
- Fortanix DSM version 3.27 or later is installed and operational.
4.0 Setting up the Fortanix Data Security Manager
4.1 Create New Veritas Instance
- Sign up at https://amer.smartkey.io/
- Log in to the Fortanix DSM UI.
- Click the Integrations tab in the left panel.
- On the Integrations page, click ADD INSTANCE on the Veritas wizard.
- Enter the following details:
- Add Instance: This is the name to identify the instance created.
- Authentication method:
- API key: This method authenticates the application with the API Gateway.
- Client Certificate: This method is used to authenticate the application with Fortanix DSM using a Client Certificate. Refer to Section 4.2.
- Select API key as the authentication method.
- Click SAVE INSTANCE.
Figure 1: Create instance
With creating an instance, a new group and app are created within Fortanix DSM.
4.2 Authenticate Using a Client Certificate
- In the Veritas instance table, under the Credentials column, for the instance created, click VIEW CREDENTIALS.
- In the "View credentials" dialog box, select the USERNAME/PASSWORD tab and copy the Username (app UUID).
Figure 2: Copy UUID
- To generate a client certificate and private key, use OpenSSL, and create a new key+cert with
export FORTANIX_APP_UUID= dddfc828-6542-4724-9a1b-fa04c2a02201
openssl req -newkey rsa:2048 -nodes -keyout netbackup.key -x509 -days 365 -out netbackup.crt -subj \
"/C=US/ST=California/L=Mountain View/O=Fortanix, Inc./OU=SE/CN=$FORTANIX_APP_UUID"
- Now, go to the detailed view of the app that the instance automatically created.
- In the app's detailed view, click Change the authentication method and select Certificate to change the authentication method to Certificate.
- Click SAVE.
- In the Add certificate dialog box, copy or upload the Certificate generated in Step 3 above in the Upload certificate text box and update the authentication method.
Figure 3: App certificate
5.0 Configuration on Veritas Backup
- Go to the installation location where NetBackup is installed on Windows.
- In this example, NetBackup is installed in the default location, that is,
- NetBackup comes with in-built KMS Commands. The command
nbkmscmd.execan be configured with Fortanix Key Management Solution.
5.1 Key Management Service (KMS) Operations
-configureKMS- Adds an entry for the KMS configuration in the NetBackup database.
deleteKMSConfig- Deletes the KMS configuration entry from the NetBackup database.
-listKMSConfig- Lists the details of the specified KMS configuration in JSON format.
-updateKMSConfig- Updates the specified KMS configuration in the NetBackup database.
-discoverNBKMS- Discovers whether the NetBackup KMS is configured and running and adds it to NetBackup.
-validateKMSConfig- Validates the functionality with the specified KMS configuration and ensures that backup and restore functionality works.
-precheckKMSConfig- Performs a dry run of KMS configuration operations to validate the required connections and setup.
5.2 Credentials Management Operations
-configureCredential- Adds the KMS configuration credential in the NetBackup database. The credential ID and its credential name are added in the database.
-deleteCredential- Deletes the specified KMS configuration credential from the NetBackup database.
-listCredential- Lists the details of the specified KMS configuration credential in JSON format. If the credential name or ID is not specified, the credential details for all KMS configurations are listed.
-updateCredential- Updates the specified KMS configuration credential.
5.3 Key Management Operations
-createKey- Creates an active NetBackup key in the KMS server that is associated with the provided configuration name.
To create a key, the KMS server should allow NetBackup to create a key and set NetBackup attributes on that key.
For NetBackup KMS, If the specified key-group name does not exist, the key-group is created with the specified algorithm.
-listKeys- Lists the NetBackup keys from the specified KMS configuration in JSON format.
5.4 Configuration Steps on Veritas Netbackup
- Create the API Key in Veritas NetBackup Security Access Keys as shown above.
Figure 4: Create API key in Veritas
- Log in to
NBKMSCMD.EXEfrom the command prompt.
Figure 5: Log in to NBKMSCMD
- For creating the credentials in NetBackup you need the following:
- OpenSSL self-signed certificate created with App UUID uploaded in Fortanix DSM App UI.
- The private key associated with the certificate.
- Fortanix DSM certificate chain (which can be downloaded from the browser).
- Configure the KMS in Fortanix as shown in the following screenshot.
Figure 6: Configure KMS
- Verify if the KMS has been configured.
Figure 7: Verify KMS
- Create a key with NetBackup CLI in Fortanix DSM.
nbkmscmd.exe -configureKMS -name Fortanix -type KMIP -kmsServerName Fortanix -port 5696 -credId 15ac2687-35aa-40a8-a07a-738a28d04f3f -enabledForBackup 1 -description Fortanix
- After the command runs successfully, You can run the following command to list the keys.
nbkmscmd.exe -listKeys -name Fortanix