mrhsm enable
Enables external KMIP keystore support.
Use the mrhsm enable
command to enable external KMIP keystore support, which is disabled by
default. See External KMIP Keystore Overview for more information.
This command is usually run as part of the configure.sh
script to configure the system for a fresh install or upgrade. However, you can run this
command manually as the superuser (root
) to change settings such as
client certificates.
mrhsm enable
command to
generate either the CLDB and DARE master key in the file-based store or the KMIP-based
store. The invocation sequence remains the same as in release 6.2.0, but the behavior is
different:- Enabling a file-based store has the following effect:
- The Core KEK and Common Root master keys are created in
${MAPR_HOME}/conf/tokens
. - If the CLDB and/or DARE master keys exist in
${MAPR_HOME}/conf/cldb.key
and${MAPR_HOME}/conf/dare.master.key
, they are imported into themrhsm
configuration file. Otherwise, new CLDB and DARE master keys are generated. In both cases, the keys are encrypted using the Core KEK in the file store. Note that importing from the KMIP store into the file store is not supported.
- The Core KEK and Common Root master keys are created in
- Once the file store is enabled, there is no way to disable it, and attempting to
do so with the
-active false
flag yields an error while thestoretype
isfile
. - The
Data Fabric
software can enable both the KMIP and File store at the same time. To load the
keys, the software first checks the KMIP-based store, then the file-based store.
Finally, the software checks the
cldb.key/dare.master.key
. - Enabling a KMIP-based store is similar to release 6.2.0, except in the case when
the CLDB and DARE master keys already exist. In this case, the keys are either
imported from the file-based store in
${MAPR_HOME}/conf/tokens
or the${MAPR_HOME}/conf/cldb.key
and${MAP_HOME}/conf/dare.master.key
. If the file-based store is enabled and thecldb.key
anddare.master.key
are available, the software checks for consistency between the two. If they are different, the software returns an error on the enable. - While there is consistency between any CLDB or DARE keys that are stored, the Core KEK and the Common KEK are different in the KMIP and file stores, yielding different encrypted text.
Syntax
# /opt/mapr/server/mrhsm enable
enable
-sopin <PIN> The PIN for the Security Officer (SO).
[ -dare ] Generate the DARE key. Set for DARE-enabled clusters
[ -active true|false ] Activate/Deactivate the KMIP configuration. Default: true
Parameters
- active
Activates or deactivates the KMIP configuration. If set to
The KMIP configuration cannot be modified using the mrhsm set command if it is active. To modify any part of the KMIP configuration after activating it, you need to first deactivate the KMIP feature by usingtrue
, this command activates (enables) the KMIP feature by creating or retrieving the Core and Common KEKs in the HSM, as well as importing or creating the CLDB and DARE keys. When this is successful, the Data Fabric core platform components, including the CLDB and MFS, retrieve the CLDB and DARE keys that are protected by the HSM Core KEK instead of from configuration files.mrhsm enable -active false
. After the configuration is deactivated, modify the KMIP configuration as needed, and use the mrhsm enable command to activate it again.- dare
- Generate the DARE key. This option takes no parameters. Specify this option to generate the DARE key for fresh installations for a DARE-enabled cluster.
- sopin
- The PIN for the Security Officer. If not specified in the command line, a prompt will be displayed to enter the SO PIN.
After it is enabled, you cannot disable the external KMIP feature without reconfiguring Data Fabric security using the configure.sh script.
Example
A sample session is as follows:
# mrhsm enable -sopin 12345678
Dare key not found in /opt/mapr/conf/dare.master.key
Found slot ID 1365794501
Obtained cluster name abc.cluster.com from mapr-clusters.conf
Enabling MapR HSM on cluster abc.cluster.com
Successfully generated CLDB key, UUID b2cc0c4f-9a7b-4580-8577-a81ac44cc022
Successfully generated Core KEK, UUID bba15392-1ef0-4ea6-8156-1da2e86a2771
Successfully generated Common KEK, UUID efac20ec-e9d2-40f3-9bd7-bbdc63b10fd5