11-24-2015
Usually no. In fact I try to remove as much decision making from a users day to day working life as I can.
If there is some blanket use policy change or instruction that needs to go out organisation wide I have management send it, then if anyone doesn't read and/or follow what has been sent out they can't complain and have their department billed accordingly.
7 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I have two systems SysA & SysB having the same userid sharing the home directory via NFS mount.
I need to know the steps to setup ssh trust between these two systems given that both share the home dir.
I have tried all the steps to generate the keys & then creating identification &... (2 Replies)
Discussion started by: deo_kaustubh
2 Replies
2. Solaris
Hi Gurus,
Got another issue.
I am trying to configure a user to run some scripts through trusted user where in while logging to remote system it shouldn't ask for password.
i did following to get it working but its not working
i create a private and public key with the below... (1 Reply)
Discussion started by: kumarmani
1 Replies
3. HP-UX
I get a message similar to this, in the syslog file.
Actually, I am trying to let the host at 10.10.10.10 access the HP-UX system.
How do I get it trusted?
Thanks! (2 Replies)
Discussion started by: instant000
2 Replies
4. UNIX for Dummies Questions & Answers
Hi, i am setting up ssh trust setup between two servers where SVRA is a solaris box and SVRB is a Red Hat Linux.
It is asking for the password all the time.
I have copied over the SVRA:/home/nagios/.ssh/id_dsa.pub as authorized_keys on
to SVRB:/dat01/home/nagios/.ssh/
-bash-3.00$ ssh -vvv... (4 Replies)
Discussion started by: uxadmin007
4 Replies
5. Linux
Hi Does anybody knows about the simple certificate enrollment protocol details ?
if yes please provide me the details.
And what is a trust anchor profile ?
Thanks in advance. (0 Replies)
Discussion started by: chaitus.28
0 Replies
6. Shell Programming and Scripting
Hi,
I want test the ssh trust between two host. It works fine if the trust is working fine but if the trust is not working fine it gets stuck.
#!/bin/sh
>/users/test/ssh.txt
for i in `cat /users/test/host.txt`;
do
ssh test@$i uname -a >> /users/test/ssh.txt
test=`cat... (0 Replies)
Discussion started by: Abhayman
0 Replies
7. What is on Your Mind?
Hey Twitter Users,
You can follow the forums on Twitter:
https://twitter.com/unixlinux
@unixlinux
Current Twitter Stats:
TWEETS 76.4K
FOLLOWERS 54.3K
Comments or questions? Please post below. (1 Reply)
Discussion started by: Neo
1 Replies
LEARN ABOUT DEBIAN
eurephiadm-certs
eurephiadm certs(7) eurephiadm certs(7)
NAME
eurephiadm-certs - Certificate management for eurephia
DESCRIPTION
Available modes for the certificate command are:
-A | --add
Register a new certificate
-D | --delete
Delete a registered certificate
-l | --list
List all registered certificates
-h | --help <mode>
Help about a specific mode
LIST MODE
The list mode will list all registered certificates. It accepts one parameter:
-S | --sort <sort key>
Decide the sort order of the certificate list
Available sort keys are:
certid
Numeric certificate ID
depth
Certificate depth
digest
Certificate SHA1 digest
cname
Certificate Common Name field
org
Certificate organisation field
email
Certificate e-mail address field
registered
When the certificate was registered in eurephia.
ADD MODE
The add mode will register a new certificate.
-d | --depth
Certificate depth, required.
-D | --digest
SHA1 fingerprint/digest of the new certificate
-C | --common-name
Common name (CN) field of the certificate
-O | --organisation
Organisation (O) field of the certificate
-E | --email
e-mail address (emailAddress) of the certificate
Usually the certificate depth value needs to be 0, if you are registering user account certificates. CA certificates usually have a value
bigger than 0.
If you have the certificate file available, you can use the following options to retrieve the needed information directly from a certifi-
cate file.
-f | --certfile
File name of the certificate file.
-p | --pkcs12
If the file is in PKCS#12 format.
The default format is PEM format, unless --pkcs12 is given. These two options cannot be used together with -D, -C, -O or -E. But the cer-
tificate depth must be given to indicate the certificate depth.
DELETE MODE
The delete mode will remove a certificate from the certificate database.
-i | --certid
Indicates a unique certificate ID
-d | --digest
A unique SHA1 fingerprint/digest value
-C | --common-name
Common Name (CN) field of a certificate
-O | --organisation
Organisation (O) field of a certificate
-E | --email
e-mail address (emailAddress) of a certificate
You can use any of these parameters to indicate a search criteria for the certificate (or certificates) you want to delete. You will be
provided with a list over certificates which matches your search criteria and you will need to approve the deletion of the matching cer-
tificate(s).
SEE ALSO
eurephiadm-users(7), eurephiadm-usercerts(7)
AUTHOR
Copyright (C) 2008-2010 David Sommerseth <dazo@users.sourceforge.net>
David Sommerseth July 2010 eurephiadm certs(7)