The Web client allows you to configure library access to a primary and optional secondary Dell Encryption Key Manager (EKM) server. For an overview of library managed encryption, see About Library Managed Encryption.
![]() |
NOTE: If you plan to use different EKM servers for different partitions, you must also fill in the overrides section of the Setup - Partition Encryption screen (Setup > Encryption > Partition Configuration). |
![]() |
NOTE: This operation should not be performed concurrently by multiple administrative users logged in from different locations. You can access the appropriate screens, but you cannot apply changes while another administrative user is performing the same operation. |
Users with administrative privileges can configure EKM system settings, but users with user privileges cannot.
![]() |
NOTE: If you have both Q-EKM and QKM, you can configure both here, one at a time. There are effecively two screens, which you can toggle between by using the drop-down list. Configure either Q-EKM or QKM first, click Apply to save your changes, then configure the other one. You can make changes to either screen whenever you need to, but remember that when you make a change, you must click Apply before switching to the other screen or your changes will not be saved. |
![]() |
NOTE: Keys are always encrypted before being sent from the server to a drive, whether SSL is enabled or not. Enabling SSL provides additional security. |
![]() |
NOTE: Keys are always encrypted before being sent from the server to a drive, whether SSL is enabled or not. Enabling SSL provides additional security. |
![]() |
NOTE: Only IPv4 and IPv6 addresses are supported on this screen. |
![]() |
NOTE: If you change the port number for the key server from the default setting on the library, you must also change the port number on the actual key server to match, or library managed encryption will not work properly. See your key server user's manual for information on changing the port number on the server. |
![]() |
NOTE: If you are using a secondary key server, then the port numbers for both the primary and secondary key servers must be set to the same value. If they are not, synchronization and failover will not occur. |
The Progress Window appears. The Progress Window contains information on the action, elapsed time, and status of the requested operation. Do one of the following:
For instructions on how to save the library configuration, see Saving the Configuration.
You may also access the EKM Path Diagnostics from this screen. For more information, see Encryption Key Manager Path Diagnostics.
See also: