To provide a password for root access on a Solaris or Linux system, you need to use the operating system tools, rather than the OS provisioning tools, to encrypt the password.
There are 3 ways to encrypt the password for OS provisioning variables:
On the OS provisioning server, run the following command: /opt/n1osp/sbin/n1osp_encrypter clear-text. The encrypted version of the clear-text displays on the screen.
Using the N1 SPS browser interface, navigate to the plan /com/sun/n1osp/untyped/EncryptPassword. In that plan, type the password. To see the encrypted value, navigate through the progress details links and view the stdout.
Type the following commands on the N1 SPS server:
# cr_cli -cmd pe.p.run -u admin -p admin -PID NM:/com/sun/n1osp/untyped/EncryptPassword \ -tar H:NM:masterserver-osp -pto 30 -nto 10 # cr_cli -cmd pe.p.lo -u admin -p admin -ID id-from-the-EncryptPassword-command # cr_cli -cmd pe.p.en -u admin -p admin -ID last-id-from-the-pe.p.lo-command |
If you need to provide a password for root access on a Solaris or Linux system, you need to use the operating system tools, rather than the OS provisioning tools, to encrypt the password.
Tools differ by operating system and by specific version of the operating system. On a Solaris 9 system, for example, most users would simply copy the root password from the /etc/shadow file. Consult your operating system documentation for more information.