You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/databox/data-box-disk-deploy-set-up.md
+50-28Lines changed: 50 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,18 +79,25 @@ Before you begin, make sure that:
79
79
80
80
Use the included USB cable to connect the disk to a Windows or Linux machine running a supported version. For more information on supported OS versions, go to [Azure Data Box Disk system requirements](data-box-disk-system-requirements.md).
81
81
82
-

82
+
:::image type="content" source="media/data-box-disk-deploy-set-up/data-box-disk-connect-unlock.png" alt-text="Screenshot showing the data box disk connector for software encrypted drives.":::
83
83
84
84
### [Hardware encryption](#tab/sed)
85
85
86
86
Only use the included SATA 3 cable to connect the disk to a Linux machine running a supported version. For more information on supported OS versions, go to [Azure Data Box Disk system requirements](data-box-disk-system-requirements.md).
87
87
88
-
Insert image of disk and cable here.
88
+
:::image type="content" source="media/data-box-disk-deploy-set-up/data-box-disk-connect-unlock-sata.png" alt-text="Screenshot showing the data box disk connector for hardware encrypted drives.":::
89
89
90
90
---
91
91
92
92
## Retrieve your passkey
93
93
94
+
In the Azure portal, navigate to your Data Box Disk Order. Search for it by navigating to **General > All resources**, then select your Data Box Disk Order. Use the copy icon to copy the passkey. This passkey will be used to unlock the disks.
95
+
96
+
[Data Box Disk unlock passkey](media/data-box-disk-deploy-set-up/data-box-disk-get-passkey.png)
97
+
98
+
Depending on whether you are connected to a Windows or Linux client, the steps to unlock the disks are different.
99
+
100
+
<!--
94
101
### [Azure Portal](#tab/portal)
95
102
96
103
In the Azure portal, navigate to your Data Box Disk Order. Search for it by navigating to **General > All resources**, then select your Data Box Disk Order. Use the copy icon to copy the passkey. This passkey will be used to unlock the disks.
@@ -104,6 +111,7 @@ Depending on whether you are connected to a Windows or Linux client, the steps t
104
111
Azure CLI instructions to retrieve your passkey
105
112
106
113
---
114
+
-->
107
115
108
116
## Unlock disks
109
117
@@ -209,49 +217,63 @@ If you run into any issues while unlocking the disks, see how to [troubleshoot u
209
217
210
218
Perform the following steps to connect and unlock hardware encrypted Data Box disks on a Linux-based machine.
211
219
212
-
> [!WARNING]
213
-
> Enabling the TPM on a device might require a reboot.
214
-
>
215
-
> The following example contains the `reboot` command. Ensure that no data will be lost before running the script.
216
220
217
-
1. The Trusted Platofrm Module (TPM) must be enabled on Linux systems for SATA-based drives. To enable TPM, set `libata.allow_tpm` to `1` by editing the GRUB config as shown in the following example. More details can be found on the Drive-Trust-Alliance public Wiki located at [https://github.com/Drive-Trust-Alliance/sedutil/wiki](https://github.com/Drive-Trust-Alliance/sedutil/wiki).
221
+
222
+
1. The Trusted Platofrm Module (TPM) must be enabled on Linux systems for SATA-based drives. To enable TPM, set `libata.allow_tpm` to `1` by editing the GRUB config as shown in the following distro-specific examples. More details can be found on the Drive-Trust-Alliance public Wiki located at [https://github.com/Drive-Trust-Alliance/sedutil/wiki](https://github.com/Drive-Trust-Alliance/sedutil/wiki).
223
+
224
+
> [!WARNING]
225
+
> Enabling the TPM on a device might require a reboot.
226
+
>
227
+
> The following example contains the `reboot` command. Ensure that no data will be lost before running the script.
228
+
229
+
### [CentOS](#tab/centos)
230
+
231
+
Use the following sample script to enable the TPM for CentOS.
1. Download the [Data Box Disk toolset](https://aka.ms/databoxdisktoolslinux). Extract and copy the **Data Box Disk Unlock Utility** to a local path on your machine.
227
-
1. Download the [SEDUtil](https://github.com/Drive-Trust-Alliance/sedutil/wiki/Executable-Distributions). For more information, visit the [Drive-Trust-Alliance public Wiki](https://github.com/Drive-Trust-Alliance/sedutil/wiki).
236
+
#Manually add \"libata.allow_tpm=1\" to the grub command line argument
> SEDUtil is an external utility for Self-Encrypting Drives. This is not managed by Microsoft. More information, including license information for this utility, can be found at [https://sedutil.com/](https://sedutil.com/).
239
+
#BIOS based systems:
240
+
grub2-mkconfig -o /boot/grub2/grub.cfg
231
241
232
-
1. Extract `SEDUtil` to a local path on the machine and add the extracted tool path to the `PATH` environment variable. This is required in a later step when the utility utilizes `SEDUtil` to unlock the disk.
242
+
#UEFI based systems:
243
+
grub2-mkconfig -o /boot/efi/EFI/centos/grub.cfg
233
244
234
-
### [CentOS](#tab/centos)
245
+
reboot
235
246
236
-
CentOS steps
247
+
#Validate that the TPM setting is set properly by checking the boot image
248
+
cat /proc/cmdline
249
+
```
237
250
238
-
### [Debian](#tab/debian)
251
+
### [Ubuntu/Debian](#tab/debian)
239
252
240
-
Debian steps
253
+
Use the following sample script to enable the TPM for Ubuntu/Debian.
241
254
242
-
### [Red Hat Enterprise Linux](#tab/rhel)
255
+
```bash
256
+
sudo nano /etc/default/grub
243
257
244
-
RHEL steps
258
+
#Manually add \"libata.allow_tpm=1\" to the grub command line argument
#Validate that the TPM setting is properly configured by checking the boot image
265
+
cat /proc/cmdline
266
+
```
249
267
250
-
### [Another distro](#tab/another)
268
+
---
251
269
252
-
Steps for another distro go here.
270
+
1. Download the [Data Box Disk toolset](https://aka.ms/databoxdisktoolslinux). Extract and copy the **Data Box Disk Unlock Utility** to a local path on your machine.
271
+
1. Download the [SEDUtil](https://github.com/Drive-Trust-Alliance/sedutil/wiki/Executable-Distributions). For more information, visit the [Drive-Trust-Alliance public Wiki](https://github.com/Drive-Trust-Alliance/sedutil/wiki).
253
272
254
-
---
273
+
> [!IMPORTANT]
274
+
> SEDUtil is an external utility for Self-Encrypting Drives. This is not managed by Microsoft. More information, including license information for this utility, can be found at [https://sedutil.com/](https://sedutil.com/).
275
+
276
+
1. Extract `SEDUtil` to a local path on the machine and add the extracted tool path to the `PATH` environment variable. This is required in a later step when the utility utilizes `SEDUtil` to unlock the disk.
255
277
256
278
1. Validate that `SEDUtil` has been extracted to a local path and that the `PATH` environment variable contains the it's path. Use the following command to perform the Validation.
257
279
@@ -398,7 +420,7 @@ Perform the following steps to connect and unlock software encrypted Data Box di
398
420
399
421
1. Repeat the unlock steps for any future disk reinserts. Use the `help` command for additional assistance with the Data Box Disk unlock tool.
0 commit comments