Red Hat CERTIFICATE SYSTEM 8 Install Manual page 54

Hide thumbs Also See for CERTIFICATE SYSTEM 8:
Table of Contents

Advertisement

Chapter 3. Installation and Configuration
NOTE
A Data Recovery Manager (DRM) is also known as a Key Recovery Agent (KRA).
All command-line tools and many files for the DRM use the abbreviation kra for this
reason. In the documentation, the subsystem used to archive and recover keys is
called the DRM or KRA interchangeably.
Once the packages are installed, then the installer automatically launches the pkicreate script
to create the default subsystem instance automatically. A URL to access the new instance is
printed to the screen which gives the subsystem instances hostname, port, and a login PIN to
access the configuration wizard.
http://server.example.com:10180/kra/admin/console/config/login?pin=kI7E1MByNIUcPJ6RKHmH
2. Open the configuration wizard using the URL returned by the package installation.
http://server.example.com:10180/kra/admin/console/config/login?pin=kI7E1MByNIUcPJ6RKHmH
Alternatively, log into the setup wizard through admin link on the services page and supply the
preop.pin value from the /var/lib/subsystem_name/conf/CS.cfg file when prompted.
https://server.example.com:10444/kra/services
3. Join an existing security domain by entering the CA information. This URL can be identified by
running service pki-ca status on the CA's host; the security domain URL is returned with
the other configuration settings. For example:
https://server.example.com:9445
When the CA is successfully contacted, then supply the admin username and password for the CA
so that it can be properly accessed.
4. Enter a name for the new instance.
44

Advertisement

Table of Contents
loading

This manual is also suitable for:

System 8 - install guide 25-03-2010

Table of Contents