Skip to main content
NetApp Knowledge Base

How to return SED to factory-configured settings after OKM data authentication key is lost

Views:
855
Visibility:
Public
Votes:
0
Category:
ontap-9
Specialty:
hw
Last Updated:

Applies to

  • ONTAP 9
  • Onboard Key Manager (OKM) 
  • Only data-key-id on SEDs
  • Self-encrypting drives (SEDs). Example:
    • X365_TPM4V1T6AMD
    • X440_TPM3V800AMD

Description

WARNING

Sanitizing one or more self-encrypting disks (SEDs), renders the existing data on the SEDs impossible to retrieve.

  • The only method to restore the encryption key is by having cluster passphrase and restoring the backup information of Onboard key Manager with output from

::> security key-manager onboard show-backup

  • This operation employs the inherent erase capability of SEDs to perform all of the following changes:
    • Changes the disk encryption key to a new random value
    • Resets the power-on lock state to false
    • Sets the  data authentication key (AK) to the default manufacture secure ID (MSID). 

 

Sign in to view the entire content of this KB article.

New to NetApp?

Learn more about our award-winning Support

NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.