Confirm Tang Key Implementation on Encrypted Device
Follow these steps to confirm that the Tang Key configuration applied to a host encrypted partition or volume was successfully implemented.
What Do You Need?
- Successful completion of the Tang server key configuration on a encrypted host device. For details, see Create a Tang Key for Encrypted Device
- Administrator privileges.
Steps