chkeyserverciphertrustmanager
Use the chkeyserverciphertrustmanager command to change the system-wide Thales CipherTrust Manager or Gemalto SafeNet KeySecure key server configuration.
Syntax
Parameters
- -sslcert certificate_file
- (Optional) Specifies the CA certificate that was used to sign the key server certificate.
- -nosslcert
- (Optional) Removes the existing CA certificate.
- -username user_name
- (Optional) Specifies the username that is used for authentication with the key servers. The value must be an alphanumeric string with a maximum of 64 characters.
- -nousername
- (Optional) Clears the username that is used for authentication with the key servers.
- -password 'password'
- (Optional) Specifies the password that is used for authentication with the key servers. The value must be an alphanumeric string with a maximum of 64 characters. You must enclose the password in single quotation marks.
- -nopassword
- (Optional) Clears the password that is used for authentication with the key servers.
- -enable
- (Optional) Enables the Thales CipherTrust Manager key server type.
- -disable
- (Optional) Disables the Thales CipherTrust Manager key server type.
Description
This command changes the Thales CipherTrust Manager key server configuration.
Keep the following items in mind when you use this command:
- The parameters -sslcert and -nosslcert are mutually exclusive.
- The parameters -username and -nousername are mutually exclusive.
- The parameters -password and -nopassword are mutually exclusive.
- The parameters -sslcert, -username, and -password can be set while the status is disabled (or enabled).
- The parameter -disable is mutually exclusive with all other parameters.
An invocation example
chkeyserverciphertrustmanager -sslcert /tmp/keysecureCA.pem -enable
The resulting output:
No feedback
An invocation example
chkeyserverciphertrustmanager -enable
The resulting output:
No feedback
An invocation example
chkeyserverciphertrustmanager -nosslcert
The resulting output:
No feedback
An invocation example
chkeyserverciphertrustmanager -username cryptoadmin -password 'ail4rthi45G1'
The resulting output:
No feedback