Sponsored Content
The Lounge War Stories Do you trust your users to follow your instructions? Post 302961174 by Swathe on Tuesday 24th of November 2015 07:48:03 PM
Old 11-24-2015
Usually no. In fact I try to remove as much decision making from a users day to day working life as I can.


If there is some blanket use policy change or instruction that needs to go out organisation wide I have management send it, then if anyone doesn't read and/or follow what has been sent out they can't complain and have their department billed accordingly.
 

7 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

ssh2-keygen trust issue

I have two systems SysA & SysB having the same userid sharing the home directory via NFS mount. I need to know the steps to setup ssh trust between these two systems given that both share the home dir. I have tried all the steps to generate the keys & then creating identification &... (2 Replies)
Discussion started by: deo_kaustubh
2 Replies

2. Solaris

configuring user as trust

Hi Gurus, Got another issue. I am trying to configure a user to run some scripts through trusted user where in while logging to remote system it shouldn't ask for password. i did following to get it working but its not working i create a private and public key with the below... (1 Reply)
Discussion started by: kumarmani
1 Replies

3. HP-UX

Not Trust Host 10.10.10.10

I get a message similar to this, in the syslog file. Actually, I am trying to let the host at 10.10.10.10 access the HP-UX system. How do I get it trusted? Thanks! (2 Replies)
Discussion started by: instant000
2 Replies

4. UNIX for Dummies Questions & Answers

ssh trust issue

Hi, i am setting up ssh trust setup between two servers where SVRA is a solaris box and SVRB is a Red Hat Linux. It is asking for the password all the time. I have copied over the SVRA:/home/nagios/.ssh/id_dsa.pub as authorized_keys on to SVRB:/dat01/home/nagios/.ssh/ -bash-3.00$ ssh -vvv... (4 Replies)
Discussion started by: uxadmin007
4 Replies

5. Linux

SCEP and Trust Anchor

Hi Does anybody knows about the simple certificate enrollment protocol details ? if yes please provide me the details. And what is a trust anchor profile ? Thanks in advance. (0 Replies)
Discussion started by: chaitus.28
0 Replies

6. Shell Programming and Scripting

SSH Trust Testing

Hi, I want test the ssh trust between two host. It works fine if the trust is working fine but if the trust is not working fine it gets stuck. #!/bin/sh >/users/test/ssh.txt for i in `cat /users/test/host.txt`; do ssh test@$i uname -a >> /users/test/ssh.txt test=`cat... (0 Replies)
Discussion started by: Abhayman
0 Replies

7. What is on Your Mind?

Twitter Users: Follow the Forums on Twitter

Hey Twitter Users, You can follow the forums on Twitter: https://twitter.com/unixlinux @unixlinux Current Twitter Stats: TWEETS 76.4K FOLLOWERS 54.3K Comments or questions? Please post below. (1 Reply)
Discussion started by: Neo
1 Replies
eurephiadm certs(7)													       eurephiadm certs(7)

NAME
eurephiadm-certs - Certificate management for eurephia DESCRIPTION
Available modes for the certificate command are: -A | --add Register a new certificate -D | --delete Delete a registered certificate -l | --list List all registered certificates -h | --help <mode> Help about a specific mode LIST MODE
The list mode will list all registered certificates. It accepts one parameter: -S | --sort <sort key> Decide the sort order of the certificate list Available sort keys are: certid Numeric certificate ID depth Certificate depth digest Certificate SHA1 digest cname Certificate Common Name field org Certificate organisation field email Certificate e-mail address field registered When the certificate was registered in eurephia. ADD MODE
The add mode will register a new certificate. -d | --depth Certificate depth, required. -D | --digest SHA1 fingerprint/digest of the new certificate -C | --common-name Common name (CN) field of the certificate -O | --organisation Organisation (O) field of the certificate -E | --email e-mail address (emailAddress) of the certificate Usually the certificate depth value needs to be 0, if you are registering user account certificates. CA certificates usually have a value bigger than 0. If you have the certificate file available, you can use the following options to retrieve the needed information directly from a certifi- cate file. -f | --certfile File name of the certificate file. -p | --pkcs12 If the file is in PKCS#12 format. The default format is PEM format, unless --pkcs12 is given. These two options cannot be used together with -D, -C, -O or -E. But the cer- tificate depth must be given to indicate the certificate depth. DELETE MODE
The delete mode will remove a certificate from the certificate database. -i | --certid Indicates a unique certificate ID -d | --digest A unique SHA1 fingerprint/digest value -C | --common-name Common Name (CN) field of a certificate -O | --organisation Organisation (O) field of a certificate -E | --email e-mail address (emailAddress) of a certificate You can use any of these parameters to indicate a search criteria for the certificate (or certificates) you want to delete. You will be provided with a list over certificates which matches your search criteria and you will need to approve the deletion of the matching cer- tificate(s). SEE ALSO
eurephiadm-users(7), eurephiadm-usercerts(7) AUTHOR
Copyright (C) 2008-2010 David Sommerseth <dazo@users.sourceforge.net> David Sommerseth July 2010 eurephiadm certs(7)
All times are GMT -4. The time now is 10:59 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy