Chapter 7 Encryption Key ManagementConfiguring Encryption Key Management on the LibraryScalar i500 User’s Guide 193• Importing Encryption Certificates on page 198• Exporting Data Encryption Keys on page 198• Importing Data Encryption Keys on page 200• Accessing the SKM Server Logs on page 201• Using the SKM Encryption Key Import Warning Log on page 201Generating Data Encryption Keys 7Data encryption keys are generated in sets of a specified quantity (see theScalar Key Manager User’s Guide for more information).The library tracks data encryption key usage and reminds you to generatemore keys when needed. If you try to generate data encryption keys onan SKM server that already has sufficient unused data encryption keys,then it will not create more. You will receive a message to that effect onthe library remote Web client.You can generate data encryption keys in the following ways:• Generating Data Encryption Keys at Initial Setup• Generating Data Encryption Keys When 80% Depleted• Generating Data Encryption Keys When 100% Depleted• Manually Generating Data Encryption KeysGenerating Data Encryption Keys at Initial Setup 7At initial setup, the library triggers each SKM server to generate a set ofdata encryption keys. The process is described in Step 6: ConfiguringPartitions for Library Managed Encryption on page 184.Generating Data Encryption Keys When 80% Depleted 7When anSKM server has used 80 percent of the data encryption keys assigned to aNote: Each library that you connect to an SKM server requires itsown set of data encryption keys. Each library only pulls dataencryption keys from the set that “belongs” to it. This meansthat an SKM server may contain several distinct sets of dataencryption keys. When the data encryption keys for onelibrary have all been used, then more keys must begenerated.