Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Log into the DSM console as the system administrator (admin). 

    1. Click the Administrators tab. (You can ignore the drop-down menu that appears.) 
    2. Click Add to create a new administrator. 
  2. In Login, enter a user name that you will use to log into the DMS.  
  3. (Optional) In Description, enter an easily identifiable description.  
  4. You can leave the RSA User ID field blank.
  5.  In Password and Confirm Confirm Password, enter a password. 
    • Armor recommends that you enter a temporary password because after you log into the DSM as the system administrator,  you will be asked to change your password. 
  6. In User Type, select System Administrator
  7. Make sure the Read-Only User box is unmarked.
  8. Click Ok


...


Step 2: Create and export a wrapper key

  1. In the top menu bar, select System.

  2. In the drop down menu, select Wrapper Keys
  3. In Operation drop-down menu, select Create
  4. Click Apply

Step 3: Export Wrapper Key

  1. In the Operation Next to Operation, in the drop-down menu, select Export
    In the Image Added
    1. Once you select Export, a new window will appear. 
    2. In the window that appears, for Minimum Custodians Needed,
    enter
    1. enter 1
    For
    1. InTotal number of Custodians,
    enter
    1. enter 1
    In the
    1. In the table, mark the newly
    created
    1. created Wrapper Key Custodian.
    2. Click Apply.
    The
    1.  The Wrapper Key has now been exported to the Wrapper Key Custodian. 
  2. Log out the DSM as the administrator. Log admin, and then log into the DSM as the Wrapper Key Custodian. 
    • When Once you log into the DSM as the Wrapper Key Custodianin, you will be asked to create a permanent change your password. 
  3. h
  4. h
  5. h
  6. hNext to Wrapper Key Share, click Show
    • The Wrapper Key Share will appear. 
  7. Copy the Wrapper Key Share, and store the information in a secure place outside of the DSM. You can use this information to decrypt the DSM configuration file after a restart. Image Added 


...

Step 3: Download the encrypted DSM configuration file

...