EasyManuals Logo

IBM XIV User Manual

IBM XIV
652 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #510 background imageLoading...
Page #510 background image
Recovery Key Verification
Used to confirm that the current user has correctly copied the recovery key share
presented by encrypt_recovery_key_get
encrypt_recovery_key_verify key=Key
Parameters:
Name Description Mandatory
key The 64 character hexadecimal
recovery key
Y
This command is meant to be used by a Security Admin to confirm that they have
correctly copied the recovery key presented by encrypt_recovery_key_get.
Encryption can be enabled (or a rekey can be completed) only when all of the
Security Admins have confirmed their respective recovery keys using this
command.
Example:
xcli -u secadmin1 -p password -c XIV1 encrypt_recovery_key_verify
key=B07C4374AC26C4DD3EC2E755EB3FAAF04EC792C8BE0D0CB1C1BAC79998EBEC6D
Output:
Command executed successfully.
Access Control:
User Category Permission
Storage administrator Disallowed
Storage integration administrator Disallowed
Application administrator Disallowed
Security administrator Allowed
Read-only users Disallowed
Technicians Disallowed
Completion Codes:
v UNSUPPORTED_HARDWARE
Cannot utilize encryption on unsupported hardware.
Troubleshooting: Contact support to verify encryption status.
v INVALID_RECOVERY_KEY_FRAGMENT
Recovery key fragment given does not match stored key.
Troubleshooting: Verify that the proper key(share) has been used
v GENERIC_FAILED
Generic encryption failure.
Troubleshooting: Contact support.
v INVALID_RECOVERY_KEY_USER
504 IBM XIV Storage System User Manual

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the IBM XIV and is the answer not in the manual?

IBM XIV Specifications

General IconGeneral
Power SupplyRedundant power supplies
Drive TypeSATA
RedundancyFully redundant components
ConnectivityFibre Channel, iSCSI
Form FactorRack-mounted
CacheDistributed cache across modules
Data ProtectionSnapshots, remote mirroring
PerformanceHigh throughput and low latency
ScalabilityModular, scale-out architecture
CoolingRedundant cooling
ArchitectureGrid-based, distributed architecture

Related product manuals