Verify the private-data-encryption
feature Example
In this topic, we demonstrate how to verify the private-data-encryption
feature, also known as Secure password storage. See Secure password storage.
To verify the private-data-encryption
feature:
- After configuring the custom 32 characters hexadecimal private data encryption key as shown in Secure password storage, in the CLI console, enter the following commands and note down the
B64TEXT
andB64HMAC
sample keys that appear:execute private-encryption-key sample
The following shows an example of successful activation:
execute private-encryption-key sample B64TEXT: oR3J+DhKPF4xSFDZv43o/pkRBCTop+4w1IU8OEaLh5I= B64HMAC: /4e77yCRzi6hunROBDm+/97bthc=
The following shows an example where the
private-data-encryption
feature is not enabled:execute private-encryption-key sample Private encryption is not enabled. Command fail. Return code 7.
- In the CLI console, enter the following commands to verify the
private-data-encryption
feature:execute private-encryption-key verify <B64TEXT> <B64HMAC> execute private-encryption-key verify oR3J+DhKPF4xSFDZv43o/pkRBCTop+4w1IU8OEaLh5I= /4e77yCRzi6hunROBDm+/97bthc= Verification passed.
Or
get system status | grep "Private Encryption" Private Encryption: Enable