TKE up and running

The Trusted Key Entry console displays the applications and utilities available on the TKE workstation. When you open a TKE application or utility, you must sign on with a profile that is on the TKE workstation crypto adapter. The individual or group profile you choose must have enough authority to do the functions performed by the application or utility.