Remote MMG Studio Configuration
For Solaris Operating System, the MMG Studio has to be configured in Linux machine remotely. The MMG Studio URL must be the same as that of the remote studio during MMG Application Installation.
In the OFS_MMG/bin/config.sh, update the following properties with
            the remote server where the MMG Studio will be running:
               
Copy the mmg-studio folder to the remote machine where you want to configure the same.
Navigate to mmg-studio/bin and update the config.sh
            file with respect to studio server values. For more details, see the Configure the
            config.sh file section.
               
export DATASTUDIO_URL=##DATASTUDIO_URL##
export SSL_KEYSTORE=##SSL_KEYSTORE##
export SSL_KS_SECRET=##SSL_KS_SECRET##
export SSL_KS_TYPE=##SSL_KS_TYPE##
export SSL_KS_ALIAS=##SSL_KS_ALIAS##
Note:
The keystore must be generated for the remote machine and the path must be present in the remote server.export DS_TNS_ADMIN_PATH=##DS_TNS_ADMIN_PATH##
export DS_WALLET_LOCATION=##DS_WALLET_LOCATION##
TNS admin and wallet must be configured in the remote server and the wallet must contain the mmg config schema wallet configurations.
export MMG_TNS_ADMIN_PATH=##MMG_TNS_ADMIN_PATH##
export MMG_LIB_WALLET_ALIAS=##MMG_LIB_WALLET_ALIAS##
Note:
The Self signed certificate needs to be generated and imported to the Java keystore.- Delete the already imported certificate from the Java
                            keystore using the below command keytool:
                              
-delete -noprompt -alias <alias_name> -keystore "<java_home>/lib/security/cacerts" -storepass "changeit" - Run the following command to re-create a Java keystore:
                              
keytool -genkey -v -alias <alias_name> -keyalg RSA -keysize 2048 -keystore server.keystore -validity 3650 -keypass secret -storepass secret -storetype PKCS12 - Create a 
.cer file from the server.keystore. keytool -export -alias <alias>-file <filename>.cer -keystore <path_to_Keystore>/server.keystore -storepass secretExample:
keytool -export -alias demo_alias -file server.cer -keystore OFS_MMG/config/server.keystore -storepass secret - Import 
.cer file generated from the above step to java keystore. keytool -import -file "<path_to_Keystore>/<filename>.cer" -alias <alias>-keystore "<java_home>/lib/security/cacerts" -storepass "changeit" 
Note:
The above step should be performed by the Root user.Note:
The token is automated. Once the token is generated, ignore '-e' character present in thetoken.out
            file.