Verifying Signed Backup Data using cmsutil
The following provides an example of using the tool called
<server_root>/bin/cert/tools/cmsutil
specific CMS subsystem instance on a UNIX system:
Verify the Backup Data File Signature
1.
Sign the CMS backup data file by executing the following command:
cmsutil -S -N <nickname of EMAIL Signing user certificate> -T
-i /var/tmp/<CMS backup data file> -o /var/tmp/<CMS backup
data file signature file> -d <server_root>/alias -p
<password>
where the CMS backup data file signature file is of the form
CMS_<instance_name_minus_cert-_prefix>_BACKUP-<YYYYMMDDhhmmss
>.signature
Invoke a command-line interface such as a telnet session
From the command line, assuming a Bourne Shell ("sh") on a Solaris
system, set and export the LD_LIBRARY_PATH environment variable:
LD_LIBRARY_PATH=<server_root>/bin/cert/lib:$LD_LIBRARY_PATH
export LD_LIBRARY_PATH
From the command line, assuming a Bourne Shell ("sh") on a Solaris
system, set and export the PATH environment variable:
PATH=<server_root>/bin/cert/tools:$PATH
export PATH
Execute the following command:
cd <server_root>/alias
Execute the following command:
ln -s <server_root>/alias/cert-<instance>-<hostname>-cert8.db
cert8.db
Execute the following command:
ln -s <server_root>/alias/cert-<instance>-<hostname>-key3.db
key3.db
Verifying Signed Backup Data using cmsutil
to verify signed backup data for a
Chapter 7
Backing Up and Restoring Data
69
Need help?
Do you have a question about the NETSCAPE MANAGEMENT SYSTEM 6.1 - COMMAND-LINE and is the answer not in the manual?
Questions and answers