This command allows software to protect secrets so that they are released only if a specified computer configuration is validated. ...