SAG configuration commands
This section lists the SAG configuration commands alphabetically.
The SAG configuration commands can be entered in single-command mode, multi-command mode, or non-transactional command-file mode, but not in transactional command-file mode. Because these commands are synchronous, the responses are sent directly to the CLI. The contents of the response depends on the command type. For a list of return codes, see CLI return codes for all commands.
The SAG configuration commands can be grouped depending on the resulting action and response, as shown in Table 1.
| Command type | Commands | Response description |
|---|---|---|
| Configuration | |
The response indicates whether the configuration data is ready for approval. |
| Approval and deployment | |
The response contains information about whether the action was successful. |
| Configuration verification | |
The response contains the requested configuration data from the SAG Add-On (if -src sag is specified) or FTM SWIFT (if -src cfg is specified) or, if there is an error, information about the error. |
| LRA, KMA, and RBAC | |
The response indicates whether the action was successful or provides the requested information. |
- SagAdmin for DNFSYSOU
- DniSA for SYSOU
- Access rights to issue the command
- The user must have a role for DNFSYSOU that contains a CO of type
DnfSAGopcfg with a name that is identical to the name of the SAG.
This CO must have assigned to it the attribute that corresponds to
the name of the command to be issued.
For example, if a user is to be able to issue the addCert command for SAG1, that user must have a role assigned for DNFSYSOU that contains a CO of type DnfSAGopcfg with the name SAG1, and that CO must have the attribute addCert assigned to it.
- Access rights to specify distinguished names
- If the user is to specify DNs as command parameters, that user
must have a role for the business OU that contains a CO of type DnfSWIFTDn.
This CO must have assigned to it all the attributes that correspond
to the DN types for which values are to be specified. How to create
such COs is described in Configuring DNs and access to them.
For example, if a user is to be able to specify the authoriser, requestor, responder, and signer (but not encrypter) DNs in a command for the OU BANKC, that user must have a role assigned for BANKC that contains a CO of type DnfSWIFTDn, and that CO must have the attributes auth, req, rsp, and sign (but not encrypt) assigned to it.
- Access rights to specify parameters
- If the user is to specify the parameter for this command, that
user must have a role for DNFSYSOU that contains a CO of type DnfSAGopcfg
with a name that is identical to the name of the SAG, and that CO
must have assigned to it the attribute that corresponds to the parameter
to be specified. Table 3 lists
these DnfSAGopcfg attributes, and indicates which parameter each attribute
authorizes a user to specify. For example, if a user is to be able to issue the second half of a LAU key for SAG1, that user must have, in addition to a role authorizing that user to enter the updateLauKey command, a role assigned for DNFSYSOU that contains a CO of type DnfSAGopcfg with the name SAG1, and that CO must have the attribute accessLauKey2 assigned to it. Only then is the user authorized to enter a command such as this:
updateLauKey -lkn LAU42123 -hk2 8u8kjhU2339ikkutTable 3. Command parameters that require specific access rights Command Parameter DnfSAGopcfg attribute updateLauKey -hk1 <first_half_key> accessLauKey1 -hk2 <second_half_key> accessLauKey2 updateSagEventTemplates -plugin Sag:APL-I pluginSAGAPL_I -plugin Sag:APL-BIMFC pluginSAGAPL_BIMFC -plugin Sag:APL-MQHA pluginSAGAPL_MQHA -plugin Sag:CM pluginSAGCM -plugin Sag:FT-I pluginSAGFT_I -plugin Sag:APL-BIMFC pluginSAG -plugin Sag:MD pluginSAGMD -plugin Sag:SN-NA pluginSAGSN_NA -plugin Sag:LOG pluginSAGLOG -plugin Sag:SN-I pluginSAGSN_I -plugin Sag:System pluginSAGSystem - Additional system administration rights
- The user requires the following additional system administration
rights for SYSOU:
- general
- The following COs and attributes must be set:
CT CO attr DniSysAdm.add DniSysAdm.add cos DniSysAdm.add DniSysAdm.add ou DniSysAdm.com DniSysAdm.com cos DniSysAdm.com DniSysAdm.com ou DniSysAdm.rej DniSysAdm.rej cos DniSysAdm.rej DniSysAdm.rej ou DniSysAdm.rem DniSysAdm.rem cos DniSysAdm.rem DniSysAdm.rem ou DniSysAdm.list DniSysAdm.list cos DniSysAdm.list DniSysAdm.list ou - list
- The following COs and attributes must be set:
CT CO attr DniSysAdm.list DniSysAdm.list cos DniSysAdm.list DniSysAdm.list ou - configuration
- The following COs and attributes must be set:
CT CO attr DniSysAdm.app DniSysAdm.app cos DniSysAdm.app DniSysAdm.app ou DniSysAdm.dep DniSysAdm.dep cos DniSysAdm.dep DniSysAdm.dep ou DniSysAdm.list DniSysAdm.list cos DniSysAdm.list DniSysAdm.list ou
| Command | Requires roles containing... | ||||
|---|---|---|---|---|---|
| Name | Abbr. | Access rights to issue the command | Access rights to specify distinguished names | Access rights to specify parameters | Additional system administration rights |
| acquireCertificate | acct | ✓ | |||
| addCert | ac | ✓ | general | ||
| addLauKey | alk | ✓ | general | ||
| addMessagePartner | amp | ✓ | ✓ | general | |
| addMQConnection | amqc | ✓ | general | ||
| addService | as | ✓ | general | ||
| addSiEndpoint | aep | ✓ | general | ||
| approve | app | ✓ | configuration | ||
| changeCertificatePassword | chctp | ✓ | |||
| createCertificate | cct | ✓ | |||
| defineSagUser | dfsu | ✓ | |||
| deleteCert | dc | ✓ | general | ||
| deleteLauKey | dlk | ✓ | general | ||
| deleteMessagePartner | dlmp | ✓ | general | ||
| deleteMQConnection | dlmqc | ✓ | general | ||
| deleteSagUser | dlsu | ✓ | |||
| deleteService | ds | ✓ | general | ||
| deleteSiEndpoint | dlep | ✓ | general | ||
| deploy | dep | ✓ | configuration | ||
| disableSwiftNetUser | disnu | ✓ | ✓ | ||
| grantRole | gr | ✓ | ✓ | ||
| listCertLists | lcl | ✓ | list | ||
| listLauKeys | llk | ✓ | list | ||
| listMessagePartner | lmp | ✓ | list | ||
| listMQConnection | lmqc | ✓ | list | ||
| listRoles | lr | ✓ | ✓ | ||
| listSagEventTemplates | let | ✓ | |||
| listSagInstances | lsag | ✓ | list | ||
| listSagUser | lsu | ✓ | |||
| listServiceLists | lsl | ✓ | list | ||
| listSiEndpoints | lep | ✓ | list | ||
| listSwiftNetUser | lsnu | ✓ | ✓ | ||
| readCertList | rcl | ✓ | list | ||
| readGlobalParameters | rgp | ✓ | list | ||
| readMessagePartner | rmp | ✓ | list | ||
| readMQConnection | rmqc | ✓ | list | ||
| readServiceList | rsl | ✓ | list | ||
| readSiEndpoint | rep | ✓ | list | ||
| recoverCertificate | rcct | ✓ | |||
| registerSwiftNetUser | rgsnu | ✓ | ✓ | ||
| removeCertFromSag | rmct | ✓ | |||
| revokeSwiftNetUser | rvsnu | ✓ | ✓ | ||
| setCertProtocol | sctp | ✓ | |||
| setupUserForCert | suct | ✓ | ✓ | ||
| setupUserForRecovery | surc | ✓ | ✓ | ||
| ungrantRole | ur | ✓ | ✓ | ||
| updateCert | uc | ✓ | ✓ | general | |
| updateGlobalParameters | ugp | ✓ | general | ||
| updateLauKey | ulk | ✓ | ✓ | ✓ | general |
| updateMessagePartner | ump | ✓ | general | ||
| updateMQConnection | umqc | ✓ | general | ||
| updateSagEventTemplates | uet | ✓ | ✓ | ||
| updateService | us | ✓ | general | ||
| updateSiEndpoint | uep | ✓ | general | ||
| Command | Required SWIFTNet role | ||
|---|---|---|---|
| Name | Abbr. | To issue the command without involving another user | To issue the command together with another user |
| disableSwiftNetUser | disnu | CertificateAdministration | CertificateAdministration4eyes |
| grantRole | gr | Delegator | Delegator4eyes |
| listSwiftNetUser | lsnu | CertificateAdministration | CertificateAdministration4eyes |
| registerSwiftNetUser | rgsnu | CertificateAdministration | CertificateAdministration4eyes |
| revokeSwiftNetUser | rvsnu | CertificateAdministration | CertificateAdministration4eyes |
| setupUserForCert | suct | CertificateAdministration | CertificateAdministration4eyes |
| setupUserForRecovery | surc | CertificateAdministration | CertificateAdministration4eyes |
| ungrantRole | ur | Delegator | Delegator4eyes |