This portal is to open public enhancement requests against IBM System Storage products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.
IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.
ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.
Hi,
The entire concept is that the key should not be stored on the client . It must be retrieved for each session, and only stored in memory for the duartion of the session.
Håkon
Hi
The SP client has two methods of storing the encryption key used. Entered locally and stored locally, or have one assigned from the SP server. In this case the customer wants backup using our infrastructure, but does not want us to be able to read backup data. They do not want to enter passwords manually, in case someone forgets to write down the correct one. An external source of key storage is hence needed. SKLM is one option, but I am sure other ones exist out there.
The keys should not be stored locally, only cached during backup/restore tasks.
Rgds
Håkon
This request may not be delivered within the release currently under development, but the theme is aligned with the current multi-year strategy. IBM may consider and evaluate any RFE Community feedback for this request through activities such as voting. IBM will update this request in the future.
Just curious when you mentioned where to store the encrypted key as API is mentioned?
In SPFS a filesystem that makes it possible to mount the Spectrum Protect storage
we use the Spectrum Protect Client API, but stores the private key locally.
https://www-50.ibm.com/partnerworld/gsd/solutiondetails.do?&solution=56435
So that can be an option too?
# setpassword /etc/spfs/my-encrypted.pwd <<< secretkey
# mount -t spfs /backup
and use whatever backup tool preferred to use