Encrypted Volume and File System v2.0 Administrator Guide HP-UX 11i v3
Example.............................................................................................................87
Creating encrypted backup media on a second EVS volume using a file utility (VxVM
mirrored volumes).....................................................................................................88
Example.............................................................................................................89
Creating cleartext backup media (VxVM mirrored volumes)............................................90
Example: Block device utility......................................................................................90
Example: File utility...................................................................................................90
Backups using nonmirrored volumes.................................................................................91
Creating encrypted backup media to a non-EVFS device (nonmirrored volumes)................91
Example.............................................................................................................92
Creating encrypted backup media on a second EVS volume using a block device utility
(nonmirrored volumes)...............................................................................................92
Example.............................................................................................................93
Creating encrypted backup media on a second EVS volume using a file utility (nonmirrored
volumes)..................................................................................................................93
Example.............................................................................................................94
Creating cleartext backup media to a non-EVFS device (nonmirrored volumes)..................94
Restoring backup media.....................................................................................................94
Restoring encrypted backup media from a non-EVFS device to an EVS volume.......................94
Example..................................................................................................................95
Restoring backup data from an EVS volume to an EVS volume.............................................95
Example..................................................................................................................96
III Encrypted File System (EFS).......................................................................97
9 Determining user roles.........................................................................100
The system administrator role.............................................................................................100
The user role...................................................................................................................100
The key manager role.......................................................................................................100
Enabling the key manager............................................................................................101
10 Creating an EFS volume and file system...............................................102
Creating an LVM or VxVM volume.....................................................................................102
Mapping the volume to EVFS.............................................................................................102
Creating a file system.......................................................................................................103
Performing operations on an EFS file system.........................................................................103
11 Using EFS.........................................................................................105
Using a secure session......................................................................................................105
Logging into a secure session........................................................................................105
Exiting from a secure session........................................................................................106
Displaying secure session information............................................................................106
Creating an encrypted file.................................................................................................106
Reading from or writing to an encrypted file........................................................................106
Changing the file permissions............................................................................................107
Changing the file owner/group.........................................................................................107
File encryption attributes...................................................................................................107
Enabling a directory or a file system for encryption..........................................................107
Enabling encryption at the FS level............................................................................108
Enabling encryption at the directory level..................................................................108
Enabling encryption at the FS and directory level........................................................109
Disabling a directory or FS for encryption.......................................................................109
Disabling encryption at the FS level...........................................................................109
Disabling encryption at the directory level..................................................................110
Listing file encryption attributes......................................................................................110
Sharing encrypted files via groups and group keys...............................................................110
File conversion operations.................................................................................................111
6 Contents