Users can now configure Self-Encrypting Drive (SED) keys directly when creating physical drives, eliminating the need for third-party tools to lock the drive beforehand. To take ownership of a physical drive with SED support (if the drive is not yet locked), use the --sed-take-ownership
option. This command will prompt for confirmation, a new SED key, and any required credentials.
Note: This process will erase all user data on the drive.
$ sudo graidctl create physical_drive /dev/nvme1 --sed-take-ownership
To bypass prompts, you can use the following options:
$ sudo graidctl create physical_drive /dev/nvme1 --sed-take-ownership --new-sed-key [New Password] --no-current-sid --confirm-to-erase
$ sudo graidctl create physical_drive /dev/nvme1 --sed-take-ownership --new-sed-key [New Password] --current-sid [Original Password] --confirm-to-erase
$ sudo graidctl create physical_drive /dev/nvme1 --sed-take-ownership --new-sed-key [New Password] --psid [PSID] --confirm-to-erase
Note: During ownership, both the SID and admin1 key will be set to the same value (the SED key), and only this SED key will be stored in the system.
[APT]apt install libssl-devel[YUM/DNF]
yum install openssl-devel
cd C:\sedutil
Below are key SEDutil commands for Windows. Replace <PSID> with the Physical Security ID printed on your drive’s label (it cannot be retrieved programmatically), <your_password> with your chosen password, and use the correct device path (e.g., \\.\PhysicalDrive#) based on the disk number identified earlier.
sedutil-cli.exe --yesIreallywanttoERASEALLmydatausingthePSID <PSID> \\.\PhysicalDrive#
sedutil-cli.exe --initialSetup <your_password> \\.\PhysicalDrive#
sedutil-cli.exe --enableLockingRange 0 <your_password> \\.\PhysicalDrive#
sedutil-cli.exe --setLockingRange 0 lk <your_password> \\.\PhysicalDrive#
Purpose: Locks range 0 on the drive using the specified password.
sedutil-cli.exe --setLockingRange 0 rw <your_password> \\.\PhysicalDrive#
sedutil-cli.exe --disableLockingRange 0 <your_password> \\.\PhysicalDrive#
sedutil-cli.exe --revertNoErase <your_password> \\.\PhysicalDrive#
Purpose: Reverts the drive to factory state without erasing data.
Complete Example
Assume you have:
- Extracted SEDutil to C:\sedutil.
- Identified your SED as Disk 0.
- Found the PSID on the drive label as ABC123....
- Chosen the password MySecurePass123.
Run these commands in sequence:
cd C:\sedutil
sedutil-cli.exe --yesIreallywanttoERASEALLmydatausingthePSID ABC123... \\.\PhysicalDrive0
sedutil-cli.exe --initialSetup MySecurePass123 \\.\PhysicalDrive0
sedutil-cli.exe --enableLockingRange 0 MySecurePass123 \\.\PhysicalDrive0
sedutil-cli.exe --setLockingRange 0 lk MySecurePass123 \\.\PhysicalDrive0
To unlock the drive:
sedutil-cli.exe --setLockingRange 0 rw MySecurePass123 \\.\PhysicalDrive0
To disable the locking range:
sedutil-cli.exe --disableLockingRange 0 MySecurePass123 \\.\PhysicalDrive0
To revert without erasing data:
sedutil-cli.exe --revertNoErase MySecurePass123 \\.\PhysicalDrive0