Settings

This page allows you to set the configuration for CIS server. Click the Settings tab, the CIS settings page is displayed. It includes:

Proxy User and Context

Includes the following:

  • CIS Server Context: By default, it is obtained from the CIS configuration. Displays the fully distinguished name of the context under which the OES server objects that can connect to the CIS server resides. For example, ou=wdc,o=acme is set as context indicates that any server within this context can connect to CIS.

  • Administrator Search Context: Specify the context of the administrator user or group object where you can configure roles for a specific user or group. For example, if o=acme is set as search context, the authentication object is searched only within this context.

  • Proxy User Name: Specify the proxy user used by the CIS server for users or groups lookup. The proxy user should have read and compare permissions for the Administrator Search Context configured. The proxy user password is reset and maintained by the CIS server. This proxy user should be used to manage only CIS.

After configuring the context settings, click SAVE.

General

Includes the following:

  • Secondary Volume Suffix Pattern: Specify the name that needs to be suffixed with the secondary volume name. The default value is _CBV. For example, if the primary volume name is VOL1, the secondary volume name is VOL1_CBV.

  • Log Level: Select the log level for CIS services. The options are: Panic, Fatal, Error, Warn, Info, and Debug. The default log level is Info.

After configuring the general settings, click SAVE.

Encryption

CIS supports pool-based encryption and generates a pool of keys for data encryption. It includes the following:

  • Key Size: Select the AES encryption key size based on your requirement.

  • Pool Size: Specify a valid integer. Based on the specified value, the corresponding pool of keys are generated and used for data encryption. The minimum pool size value is 127.

After configuring the encryption settings, click SAVE to generate the pool of keys. To again generate a new pool of keys for a different Pool Size values, click REGENERATE.

For trademark and copyright information, see Legal Notices.