APPENDIX
242
The encrypted volume is not visible in the system Disk Manage-
ment.
Step 3.
Generate Key File
You can generate the new key by CLI utility or API code function.