Considerations” on page 2-3.It is impossible to overstate the importance of preserving your keystore data.Without access to your keystore you will be unable to decrypt yourencrypted tapes. Please carefully read the topics below to understand themethods available for protecting your keystore data.Configuration filesThe configuration files allow you to customize the behavior of theEncryption Key Manager to meet the needs of your organization. Thesebehavioral choices are described extensively in this document, first inChapter 2, “Planning Your Encryption Key Manager Environment,” onpage 2-1, then in the Chapter 4, “Configuring the Encryption KeyManager,” on page 4-1, and later in Appendix B where the full set ofconfiguration options is described.Tape drive tableThe tape drive table is used by the Encryption Key Manager to keep trackof the tape devices it supports. The tape drive table is a non-editable,binary file whose location is specified in the configuration file. You canchange its location to meet your needs.KeyGroups.xml fileThis password-protected file contains the names of all encryption keygroups and the aliases of the encryption keys associated with each keygroup.Managing EncryptionThe Dell Encryption Key Manager is a Java™ software program that assistsencryption-enabled tape drives in generating, protecting, storing, and maintainingencryption keys that are used to encrypt information being written to, and decryptinformation being read from, tape media (tape and cartridge formats). TheEncryption Key Manager operates on Linux (SLES and RHEL) and Windows, andis designed to run in the background as a shared resource deployed in severalKeystoreDriveTableHolds public/private keypairs and certificatesTracks which tapedevicessupportsEncryption KeyManagerRecords Keystore location anddefinesbehaviorEncryption KeyManagerGenerates encryption keysand manages their transferto and from tape devicesa14m0234KeyGroupsConfigFileOrganizesencryptionkeys intogroupsEncryption Key ManagerFigure 1-1. The Encryption Key Manager’s four main components1-2 Dell Encryption Key Mgr User's Guide