Using response files

A response file is a text file that contains product and system information, sometimes used in configuration.

Some utilities can be run in either command-line mode or response file mode.
  • In command-line mode, all parameters must be specified from the command line.
  • In response file mode, the utility obtains the necessary parameters from the response file. You must manually create the response file by entering all parameters.
Within response files, stanza labels display within brackets, such as [stanza-name]. Each stanza in a Security Access Manager response file contains one or more key value pairs. Key value pairs express information as a paired set of parameters. Each stanza entry is a key-value pair in the following format:
key = value

In the response file, the key is equal to the parameter in command-line mode. The following example shows that when there is a -parameter specified in command-line mode, the key in response file mode is the same, but without the preceding dash.

Examples

  • The following example uses the /tmp/rspfile/cars_pdacld.rsp response file to configure an audit server by using SSL and password authentication:
    amauditcfg –rspfile /tmp/rspfile/cars_pdacld.rsp
    The /tmp/rspfile/cars_pdacld.rsp response file contains the following data:
    [amauditcfg]
    action = config
    srv_cfg_file = /opt/PolicyDirector/etc/ivacld.conf
    audit_srv_url = https://hostname:9443/CommonAuditService/services/Emitter
    enable_ssl = yes
    audit_key_file = /certs/WSclient.kdb
    audit_stash_file = /certs/WSclient.sth
    enable_pwd_auth = yes
    audit_id = administrator_id
    audit_pwd = password
  • In contrast, the following example uses command-line mode to configure an audit server by using SSL and password authentication:
    amauditcfg -action config \
      -srv_cfg_file /opt/PolicyDirector/etc/ivacld.conf \
      -audit_srv_url https://hostname:9443/CommonAuditService/services/Emitter \
      -enable_ssl yes -audit_key_file /certs/WSclient.kdb \
      -audit_stash_file /certs/WSclient.sth -enable_pwd_auth yes \
      -audit_id administrator_id -auditpwd password