Skip to content

Commit 5cfe1a7

Browse files
committed
updates to SED for set-up article
1 parent 8b3fb19 commit 5cfe1a7

File tree

2 files changed

+50
-28
lines changed

2 files changed

+50
-28
lines changed

articles/databox/data-box-disk-deploy-set-up.md

Lines changed: 50 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -79,18 +79,25 @@ Before you begin, make sure that:
7979

8080
Use the included USB cable to connect the disk to a Windows or Linux machine running a supported version. For more information on supported OS versions, go to [Azure Data Box Disk system requirements](data-box-disk-system-requirements.md).
8181

82-
![Data Box Disk connect](media/data-box-disk-deploy-set-up/data-box-disk-connect-unlock.png)
82+
:::image type="content" source="media/data-box-disk-deploy-set-up/data-box-disk-connect-unlock.png" alt-text="Screenshot showing the data box disk connector for software encrypted drives.":::
8383

8484
### [Hardware encryption](#tab/sed)
8585

8686
Only use the included SATA 3 cable to connect the disk to a Linux machine running a supported version. For more information on supported OS versions, go to [Azure Data Box Disk system requirements](data-box-disk-system-requirements.md).
8787

88-
Insert image of disk and cable here.
88+
:::image type="content" source="media/data-box-disk-deploy-set-up/data-box-disk-connect-unlock-sata.png" alt-text="Screenshot showing the data box disk connector for hardware encrypted drives.":::
8989

9090
---
9191

9292
## Retrieve your passkey
9393

94+
In the Azure portal, navigate to your Data Box Disk Order. Search for it by navigating to **General > All resources**, then select your Data Box Disk Order. Use the copy icon to copy the passkey. This passkey will be used to unlock the disks.
95+
96+
[Data Box Disk unlock passkey](media/data-box-disk-deploy-set-up/data-box-disk-get-passkey.png)
97+
98+
Depending on whether you are connected to a Windows or Linux client, the steps to unlock the disks are different.
99+
100+
<!--
94101
### [Azure Portal](#tab/portal)
95102
96103
In the Azure portal, navigate to your Data Box Disk Order. Search for it by navigating to **General > All resources**, then select your Data Box Disk Order. Use the copy icon to copy the passkey. This passkey will be used to unlock the disks.
@@ -104,6 +111,7 @@ Depending on whether you are connected to a Windows or Linux client, the steps t
104111
Azure CLI instructions to retrieve your passkey
105112
106113
---
114+
-->
107115

108116
## Unlock disks
109117

@@ -209,49 +217,63 @@ If you run into any issues while unlocking the disks, see how to [troubleshoot u
209217
210218
Perform the following steps to connect and unlock hardware encrypted Data Box disks on a Linux-based machine.
211219
212-
> [!WARNING]
213-
> Enabling the TPM on a device might require a reboot.
214-
>
215-
> The following example contains the `reboot` command. Ensure that no data will be lost before running the script.
216220
217-
1. The Trusted Platofrm Module (TPM) must be enabled on Linux systems for SATA-based drives. To enable TPM, set `libata.allow_tpm` to `1` by editing the GRUB config as shown in the following example. More details can be found on the Drive-Trust-Alliance public Wiki located at [https://github.com/Drive-Trust-Alliance/sedutil/wiki](https://github.com/Drive-Trust-Alliance/sedutil/wiki).
221+
222+
1. The Trusted Platofrm Module (TPM) must be enabled on Linux systems for SATA-based drives. To enable TPM, set `libata.allow_tpm` to `1` by editing the GRUB config as shown in the following distro-specific examples. More details can be found on the Drive-Trust-Alliance public Wiki located at [https://github.com/Drive-Trust-Alliance/sedutil/wiki](https://github.com/Drive-Trust-Alliance/sedutil/wiki).
223+
224+
> [!WARNING]
225+
> Enabling the TPM on a device might require a reboot.
226+
>
227+
> The following example contains the `reboot` command. Ensure that no data will be lost before running the script.
228+
229+
### [CentOS](#tab/centos)
230+
231+
Use the following sample script to enable the TPM for CentOS.
218232
219233
```bash
220234
sudo nano /etc/default/grub
221-
GRUB_CMDLINE_LINUX_DEFAULT="quiet splash libata.allow_tpm=1"
222-
sudo update-grub
223-
reboot
224-
```
225235
226-
1. Download the [Data Box Disk toolset](https://aka.ms/databoxdisktoolslinux). Extract and copy the **Data Box Disk Unlock Utility** to a local path on your machine.
227-
1. Download the [SEDUtil](https://github.com/Drive-Trust-Alliance/sedutil/wiki/Executable-Distributions). For more information, visit the [Drive-Trust-Alliance public Wiki](https://github.com/Drive-Trust-Alliance/sedutil/wiki).
236+
#Manually add \"libata.allow_tpm=1\" to the grub command line argument
237+
GRUB_CMDLINE_LINUX_DEFAULT=\"quiet splash libata.allow_tpm=1\"
228238
229-
> [!IMPORTANT]
230-
> SEDUtil is an external utility for Self-Encrypting Drives. This is not managed by Microsoft. More information, including license information for this utility, can be found at [https://sedutil.com/](https://sedutil.com/).
239+
#BIOS based systems:
240+
grub2-mkconfig -o /boot/grub2/grub.cfg
231241
232-
1. Extract `SEDUtil` to a local path on the machine and add the extracted tool path to the `PATH` environment variable. This is required in a later step when the utility utilizes `SEDUtil` to unlock the disk.
242+
#UEFI based systems:
243+
grub2-mkconfig -o /boot/efi/EFI/centos/grub.cfg
233244
234-
### [CentOS](#tab/centos)
245+
reboot
235246
236-
CentOS steps
247+
#Validate that the TPM setting is set properly by checking the boot image
248+
cat /proc/cmdline
249+
```
237250
238-
### [Debian](#tab/debian)
251+
### [Ubuntu/Debian](#tab/debian)
239252
240-
Debian steps
253+
Use the following sample script to enable the TPM for Ubuntu/Debian.
241254
242-
### [Red Hat Enterprise Linux](#tab/rhel)
255+
```bash
256+
sudo nano /etc/default/grub
243257
244-
RHEL steps
258+
#Manually add \"libata.allow_tpm=1\" to the grub command line argument
259+
GRUB_CMDLINE_LINUX_DEFAULT=\"quiet splash libata.allow_tpm=1\"
245260
246-
### [Ubuntu](#tab/ubuntu)
261+
sudo update-grub
262+
reboot
247263
248-
Ubuntu steps
264+
#Validate that the TPM setting is properly configured by checking the boot image
265+
cat /proc/cmdline
266+
```
249267
250-
### [Another distro](#tab/another)
268+
---
251269
252-
Steps for another distro go here.
270+
1. Download the [Data Box Disk toolset](https://aka.ms/databoxdisktoolslinux). Extract and copy the **Data Box Disk Unlock Utility** to a local path on your machine.
271+
1. Download the [SEDUtil](https://github.com/Drive-Trust-Alliance/sedutil/wiki/Executable-Distributions). For more information, visit the [Drive-Trust-Alliance public Wiki](https://github.com/Drive-Trust-Alliance/sedutil/wiki).
253272
254-
---
273+
> [!IMPORTANT]
274+
> SEDUtil is an external utility for Self-Encrypting Drives. This is not managed by Microsoft. More information, including license information for this utility, can be found at [https://sedutil.com/](https://sedutil.com/).
275+
276+
1. Extract `SEDUtil` to a local path on the machine and add the extracted tool path to the `PATH` environment variable. This is required in a later step when the utility utilizes `SEDUtil` to unlock the disk.
255277
256278
1. Validate that `SEDUtil` has been extracted to a local path and that the `PATH` environment variable contains the it's path. Use the following command to perform the Validation.
257279
@@ -398,7 +420,7 @@ Perform the following steps to connect and unlock software encrypted Data Box di
398420
399421
1. Repeat the unlock steps for any future disk reinserts. Use the `help` command for additional assistance with the Data Box Disk unlock tool.
400422
401-
`sudo ./DataBoxDiskUnlock /Help`
423+
`sudo //ataBoxDiskUnlock /Help`
402424
403425
Sample output is shown below.
404426
197 KB
Loading

0 commit comments

Comments
 (0)