Before KMIP connections can occur, the NetApp ONTAP instance and KMES Series 3 must establish a mutual trust relationship by validating their respective digitally signed certificates. The following sections demonstrate how to generate and sign certificates for NetApp ONTAP and the KMIP server connection pair on the KMES Series 3. The certificates are registered in both NetApp ONTAP and the KMIP server connection pair on the KMES Series 3 and are used each time a TCP/IP session secured by TLS is established.Documentation Index
Fetch the complete documentation index at: https://docs.futurex.com/llms.txt
Use this file to discover all available pages before exploring further.
Generate and sign the NetApp ONTAP certificate
There are two optional methods for generating and signing the NetApp ONTAP and KMIP server certificates:- Use an external CA
- Use the KMES Series 3 as the CA
It’s also possible to use one method for the NetApp ONTAP certificate and the other method for the KMIP server certificate.
Method 1: Use an external CA
For this method, import the external CA certificates into an empty certificate container on the KMES. Then, generate a Certificate Signing Request (CSR), which the external CA uses to issue a TLS client certificate for the NetApp ONTAP instance. Finally, import the certificate into the certificate container on the KMES that contains the external CA certificate.Specify a name for the certificate container, such as
Externally Issued, and select [ OK ]*.The new certificate container displays in the Certificate Authorities window.
In the Import Certificates window, select [ Add ] and find and select the external CA certificate that issues the NetApp ONTAP TLS certificate. The CA certificates populate in the Verified section of the Import Certificates window.
Select [ OK ] to save.
The external CA certificates now display in tree form under the certificate container.
Next, create a placeholder TLS client certificate to generate a CSR. Right-click the lowest-level CA certificate in the tree and select Add Certificate> Pending.
On the Subject DN tab of the Create X.509 Certificate window, set a Common Name for the certificate, such as
NetApp ONTAP.Leave all of the settings on the Subject DN tab of the Create PKCS #10 Request window as the default values.
On the PKCS #10 Info tab, specify a save location for the CSR and select [ OK ].
A message states the certificate signing request was successfully written to the location you specified.
Then, send the CSR file to an external certificate authority. The external CA uses the CSR to issue a TLS client certificate.
After the external CA issues the TLS client certificate, copy it to the storage medium configured on the KMES.
Go to PKI> Certificate Authorities, right-click the placeholder NetApp ONTAP certificate, and select Replace> With Signed Certificate.
In the Import Certificates window, select [ Add ]. Then, find and select the externally signed TLS client certificate in the file browser. The certificate displays under the CA certificates in the Verified section of the Import Certificates window.
The remaining steps in this procedure involve exporting the NetApp ONTAP certificate as a PKCS #12 file. To do this, go to Administration> Configuration> Options and enable Allow export of certificates using passwords. After enabling this option, select [ Save ].
Go to PKI> Certificate Authorities, right-click the NetApp ONTAP certificate, and select Export> PKCS12.
In the Export PKCS12 window, select Export Selected and change the Cipher Options to AES-256. Note and optionally modify the file name, and select [ Next ].
Method 2: Use the KMES Series 3 as the CA
Perform the following steps to use the KMES Series 3 as the CA:Specify a name for the certificate container, such as
KMES Issued, and select [ OK ].The new certificate container displays in the Certificate Authorities menu.
On the Basic Info tab, change the key size to
4096. Leave all other settings set to the default values.On the V3 Extensions tab, select the Certificate Authority profile and select [ OK ].
The Root CA certificate now displays under the KMES-issued certificate container.
The remaining steps in this procedure involve exporting the NetApp ONTAP certificate as a PKCS #12 file. To do this, perform the following steps:1. Go to Administration> Configuration> Options.2. Enable Allow export of certificates using passwords.3. Select [ Save ].
Go to PKI> Certificate Authorities, right-click on the NetApp ONTAP certificate, and select Export> PKCS12.
In the Export PKCS12 window, select Export Selected and change the Cipher Options to AES-256. Note and optionally modify the file name and select [ Next ].
Create and configure the KMIP server certificate
Perform the following tasks to create and configure a TLS server certificate for the KMIP connection pair on the KMES Series 3:- Generate a private key and construct a CSR.
- Sign the KMIP connection pair CSR using an external CA or CA generated on the KMES.
- Get all certificates in the CA tree.
- Configure the KMIP connection pair to use the signed certificate and CA chain.
Generate a private key and CSR
Perform the following steps to generate a private key and construct a CSR:When prompted that SSL will not be functional until new certificates are imported, select [ Yes ] to continue.
In the PKI Parameters window, leave all fields set to the default values and select [ OK ].
The Application Public Keys window now shows that a PKI Key Pair is Loaded.
In the Subject DN tab, select Classic from the Preset drop-down list and specify the hostname or IP address of the KMES in Common Name.
When prompted that the certificate signing request was successfully written to the specified location, select [ OK ].
Sign the CSR
Perform the following steps to sign the KMIP connection pair CSR:In the file browser, select the KMIP connection pair CSR.
Certificate information populates in the Create X.509 From CSR window.
Export all certificates
If you signed the KMIP server certificate with an external CA, download each individual CA certificate in the CA tree using a mechanism supported by the external CA. If you signed the KMIP server certificate using a KMES-hosted CA, perform the following steps to export each CA certificate in the tree:Configure the KMIP connection pair
Perform the following steps to configure the KMIP connection pair to use the signed certificate and CA chain:On the Certificate Authority window, right-click the KMIP SSL CA X.509 certificate container and select [ Import ].
In the file browser, select the signed KMIP server certificate and every CA certificate in the CA tree, then select [ Open ].
The certificates now display in the Verified section of the Import Certificates window.
Select [ OK ] to save.
You now see Signed loaded next to Certificates in the User Certificates section of the Network Options window under the KMIP connection pair.
Create a role and identity
This section covers the following tasks to create a role and identity on the KMES Series 3 for NetApp ONTAP:- Add a PKI Identity Provider.
- Create a NetApp ONTAP role.
- Create a NetApp ONTAP identity.
Add a PKI identity provider
Perform the following steps to add a PKI identity provider (IdP) configured with the TLS authentication mechanism:On the Info tab of the Identity Provider Editor window, specify a name for the Identity Provider and uncheck Enforce Dual Factor.
In the Certificate Selector window, expand the certificate tree you created for mutual authentication, select the root CA certificate for the CA that issued the NetApp ONTAP certificate, and select [ OK ].
Create a role
Perform the following steps to create a role for NetApp ONTAP:On the Info tab of the Role Editor window, set the Type to Application, set any name(the role name does not matter), and Logins Required to
1.On the Permissions tab, enable all of the following permissions (including their sub-permissions):
- Certificate Authority
- Cryptographic Operations
- Keys
Create an identity
Perform the following steps to create an identity for NetApp ONTAP:On the Info tab of the Identity Editor window, select Application for the storage location and specify
NetApp ONTAP as the identity name.The identity name MUST match the Common Name of the NetApp ONTAP TLS client certificate. If it does not, TLS authentication fails.
In the Configure Credential window, select the TLS Certificate drop-down option in Type and select the Provider and Mechanism you created. Select [ OK ] to finish configuring the credential.

