Before you enable RDL on the FlashArray, the array and the KMES Series 3 must establish a mutual trust relationship by validating their respective digitally signed certificates. The following sections show how to generate and sign certificates for both the FlashArray and the KMIP connection pair on the KMES Series 3. The FlashArray and the KMES register both certificates and use them thereafter each time they establish a TCP/IP session secured by TLS.Documentation Index
Fetch the complete documentation index at: https://docs.futurex.com/llms.txt
Use this file to discover all available pages before exploring further.
Notes about certificates:
- Certificates used on the FlashArray must be PEM formatted (Base64 encoded).
- Intermediary certificates are not supported for use with KMIP.
- Using the Purity internal management certificate for KMIP configuration is not supported.
Create a certificate and CSR
Use the FlashArray Command Line Interface (CLI) to complete the following steps to create a FlashArray certificate and CSR:Create a certificate
Perform the following steps to create a FlashArray certificate:Create a CSR
Perform the following steps to create a CSR:Configure KMES Series 3
Log in to the KMES Series 3 application interface with the default Admin identities to complete the following tasks:- Create a new CA.
- Sign the FlashArray CSR.
- Create and configure the TLS certificate for the KMIP connection pair on the KMES Series 3.
- Create a role and identity on the KMES Series 3 for FlashArray.
Create a new CA
Perform the following steps to create a new CA:In the Certificate Authority window, enter a name for the certificate container, leave all other fields as the default values, and select [ OK ].
The certificate container you created now displays in the Certificate Authorities menu.
Sign the FlashArray CSR
Perform the following steps to sign the FlashArray CSR:In the file browser, select the FlashArray CSR.
Certificate information populates in the Create X.509 From CSR window.
Create and configure the TLS certificate
Perform the following tasks to create and configure the TLS certificate for the KMIP connection pair on the KMES Series 3:- Generate a private key and construct a CSR.
- Sign the KMIP connection pair CSR.
- Export all certificates in the CA tree.
- Configure the KMIP connection pair to use the signed certificate and CA chain.
Generate a private key and CSR
Perform the following steps to generate a private key and construct a CSR:When prompted that SSL will not be functional until new certificates are imported, select [ Yes ] to continue.
In the PKI Parameters window, leave all fields set to the default values and select [ OK ].
The Application Public Keys window now shows that a PKI Key Pair is Loaded.
In the Subject DN tab, select Classic from the preset drop-down list and specify the hostname or IP address of the KMES in Common Name.
When prompted that the certificate signing request was successfully written to the specified location, select [ OK ].
Sign the CSR
Perform the following steps to sign the KMIP connection pair CSR:In the file browser, select the KMIP connection pair CSR.
Certificate information populates in the Create X.509 From CSR window.
Export all certificates
Perform the following steps to export each certificate in the CA tree:Configure the connection pair
Perform the following steps to configure the KMIP connection pair to use the signed certificate and CA chain:In the Certificate Authority window, right-click the KMIP SSL CA X.509 certificate container and select [ Import ].
In the file browser, select both the root CA certificate and the signed KMIP connection pair certificate and select [ Open ].
The certificates now display in the Verified section of the Import Certificates window.
Select [ OK ] to save.
You now see Signed loaded next to Certificates in the User Certificates section of the Network Options window under the KMIP connection pair.
Create a role and identity
The following sections provide instructions for the following tasks to create a role and identity on the KMES Series 3 for FlashArray:- Add a PKI identity provider configured with the TLS authentication mechanism.
- Create a role for FlashArray.
- Create an identity for FlashArray.
Add a PKI IP
Perform the following steps to add a PKI identity provider (IP) configured with the TLS authentication mechanism:On the Info tab of the Identity Provider Editor window, specify a name for the IP and uncheck Enforce Dual Factor.
In the Certificate Selector window, expand the certificate tree you created for mutual authentication, select the CA certificate that signed the FlashArray and KMIP connection pair certificates, and select [ OK ].
Create a role
Perform the following steps to create a role for FlashArray:In the Info tab of the Role Editor window, set the Type to Application, the name to FlashArray, and Logins Required to
1.Create an identity
Perform the following steps to create an identity for FlashArray:On the Info tab of the Identity Editor window, select Application for the storage location and specify FlashArray as the identity name.
In the Configure Credential window, select the TLS Certificate drop-down option in Type and select the Provider and Mechanism you created. Select [ OK ] to finish configuring the credential.

