mirror of
https://github.com/openshift/openshift-docs.git
synced 2026-02-05 12:46:18 +01:00
Incorporate the peer-review feedback Update nbde-tang-server-operator-release-notes.adoc Update the link to the released erratum Apply suggestions from code review Co-authored-by: Michael Burke <mburke@redhat.com> Unify the admin prerequisites Split commands and outputs
20 lines
1.1 KiB
Plaintext
20 lines
1.1 KiB
Plaintext
:_mod-docs-content-type: ASSEMBLY
|
|
[id="identifying-url-nbde-tang-server-operator"]
|
|
= Identifying URL of a Tang server deployed with the NBDE Tang Server Operator
|
|
include::_attributes/common-attributes.adoc[]
|
|
:context: identifying-url-nbde-tang-server-operator
|
|
|
|
toc::[]
|
|
|
|
Before you can configure your Clevis clients to use encryption keys advertised by your Tang servers, you must identify the URLs of the servers.
|
|
|
|
include::modules/nbde-tang-server-operator-identifying-url-web-console.adoc[leveloffset=+1]
|
|
|
|
include::modules/nbde-tang-server-operator-identifying-url-cli.adoc[leveloffset=+1]
|
|
|
|
[id="additional-resources-identifying-url-nbde-tang-server-operator"]
|
|
[role="_additional-resources"]
|
|
== Additional resources
|
|
|
|
* link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/configuring-automated-unlocking-of-encrypted-volumes-using-policy-based-decryption_security-hardening#configuring-manual-enrollment-of-volumes-using-clevis_configuring-automated-unlocking-of-encrypted-volumes-using-policy-based-decryption[Configuring manual enrollment of LUKS-encrypted volumes] section in the RHEL 9 Security hardening document.
|