Implementing encryption on XIV
This chapter describes how to configure and implement data-at-rest encryption for the XIV system.
It covers these topics:
Note: Several illustrations in this chapter are based on Version 2.6 of the IBM Security Key Lifecycle Manager GUI. Older versions, including IBM Tivoli® Key Lifecycle Manager, ...