Perform the following steps to create the KMIP configuration file:
1
Open a text editor and create a kmip.cfg configuration file with the following details:
Text
VERSION=1PRODUCT_NAME=OTHERALLOW_KEY_INSERT_WITHOUT_KEYSTORE_BACKUP=trueSSL_KEYDB=C:\Path\to\clientkeydb.p12SSL_KEYDB_STASH=C:\Path\to\clientkeydb.sthSSL_KMIP_CLIENT_CERTIFICATE_LABEL=<LABEL OF CLIENT CERTIFICATE>ALLOW_NONCRITICAL_BASIC_CONSTRAINT=falseMASTER_SERVER_HOST=<IP ADDRESS OF CryptoHub>MASTER_SERVER_KMIP_PORT=<KMIP PORT>
The following sample shows an example configuration file:
Perform the following steps to create the encrypted database and verify the integration:
1
In the IBM Db2 Command Line Processor, run the following commands to create an encrypted database:
Text
db2 => create db fxencdb encrypt
Replace fxencdb with the desired database name. Note that database names must not be longer than eight characters.
2
After running the preceding command, the master encryption key generates inside the IBM Db2 service on the CryptoHub.
The following message displays after the process successfully completes:
None
DB20000I The CREATE DATABASE command completed successfully.
3
Verify the database has been successfully encrypted by executing the following command:
Text
db2 => get db cfg for fxencdb
Ensure that the Encrypted Database configuration parameter is set to YES in the command response.
4
Verify the creation of the key on the CryptoHub by going to Key Management > Keys. The HSM Protected key generated for IBM DB2 is similar to the following naming scheme: