Use the chencryption command to manage the encryption state of the
system. This command applies only to models that support
encryption.
Syntax
chencryption [ -usb { enable | disable | validate | newkey -key { prepare | commit | cancel } } ] [ -keyserver { enable | disable | newkey -key { prepare | commit | cancel } } ]
Parameters
- -usbenable | disable | validate | newkey
- (Required if you do not specify -keyserver) Specifies whether USB
encryption is enabled (or disabled) or the encryption keys are validated. You can also create new
encryption keys that are also stored on Universal Serial Bus (USB) flash drives for use if the
system forgets the encryption keys.
- -usbenable
- Enables encryption capability on the system. Then specify -usbnewkey to create new keys. Use this command when the system has encryption
hardware and encryption licenses (for example, the lsencryption value for
status is set to licensed).
- -usbdisable
- Disables the encryption capability of the system. If no encryption key is prepared this
operation is complete and no further action is needed. Do not use this command if an encryption key
is prepared or encrypted objects exist.
Remember: This removes all encryption keys (that
are not on the USB flash drive) from the system.
- -usbvalidate
- Verifies that encryption keys are present on the USB flash drive and makes sure that the keys
match the system encryption keys. Use this command when encryption is enabled and encryption keys
exist (for example, lsencryption value for usb_rekey is set to
no).
- -usbnewkey
- Generates a new encryption key on a USB flash drive that is attached to the system. Use this
command only if the minimum number of USB flash drives that can be used as key material stores are
attached to the system (as reported by lsportusb). When you specify this
parameter, the -key option must also be supplied.
- -keyserverenable | disable | newkey
- (Required if you do not specify -usb) Specifies the encryption task that
involves encryption keys that are managed by key servers.
- -keyserverenable
- Enables encryption capability on the system. Use this command when the system has encryption
hardware and encryption licenses (for example, the lsencryption value for
keyserver_status is set to licensed).
- -keyserverdisable
- Disables the encryption capability of the system. If no encryption key is prepared, this
operation is complete and no further action is needed. Do not use this command if an encryption key
is prepared or encrypted objects exist.
- -keyservernewkey
- Generates a new encryption key on the primary key server that is attached the system. You must
also specify -key when you specify this parameter.
- -keyprepare | commit | cancel
- (Optional) Manages the creation of a new or replacement (rekey) encryption keys when
-usb newkey or -keyserver newkey is specified. There are three
stages:
- -keyprepare
- Generates system encryption keys and writes those keys to all system attached USB flash drives
or key servers. If there is active encryption key material, confirm
that at least one USB flash drive or key server has the current key material. Use this command
only when the lsencryption value for usb_rekey or
keyserver_rekey is set to no or no_key.
- -keycommit
- Commits the prepared key as the current key. Use this command when the
lsencryption value for usb_rekey or
keyserver_rekey is set to prepared and the number of USB
encryption keys is at least the minimum number required.
- -keycancel
- Cancels any specified key changes. Use this command when the
lsencryptionvalue for usb_rekey or
keyserver_rekey is set to prepared.
Description
Use this command to manage the encryption state of the system. You must specify either
-usb or -keyserver.
You can use this command can to turn on or turn off USB key encryption or key server encryption
(but you cannot disable encryption if there are any encrypted objects). There are four types:
You can also perform a rekey of the external USB key or key server key material, which is divided
into three stages:
- prepare, which generates new keys and sets up the system to change encryption
keys during apply
- commit, which includes applying new keys (and copying key material)
- cancel, which rolls back the key setup that is performed during the
prepare and cancels the rekey request
You can use both USB flash drive and key
server encryption in parallel on the same system. However, you must configure and administer these
encryption methods independently.
An invocation example
chencryption -usb enable
The resulting output:
No feedback
An invocation example
chencryption -usb newkey -key prepare
The resulting output:
No feedback
An invocation example
chencryption -usb newkey -key commit
The
resulting output:
No feedback
An invocation example
chencryption -keyserver enable
The resulting output:
chencryption -keyserver newkey -key prepare
An invocation example
chencryption -keyserver newkey -key commit
The resulting output:
No feedback