Setting Credentials for the AI Server
Use the following command:
$ installadm set-server [-D] --hmac-type signature-type [-g| [-H]]
The -D option is only used with the set-server subcommand. For an explanation of the options, see Securing Automated Installations.
If you use only the --hmac-type
signature-type option, the command sets the active HMAC signature type for the server.
The following example automatically creates HTTP certificates. Because the --hmac-type is not specified, then for SPARC clients, HMAC keys are generated based on the default HMAC-SHA1 protocol.
$ installadm set-server -g
The root CA certificate has been generated.
The CA signing certificate request has been generated.
The signing CA certificate has been generated.
A new certificate key has been generated.
A new certificate has been generated.
Generated client encryption (AES) firmware key:
8d210964e95f2a333c5e749790633273
Generating new hashing key (HMAC)...
Generated client hashing (HMAC SHA-1) firmware key:
4088861239fa3f3bed22f8eb885bfa476952fab4
Changed ServerTo generate credentials as well as SHA256 keys, you would type the following command instead:
$ installadm set-server --hmac-type hmac-sha256 -g
Note:
To manually provide your own credentials, see Generating Credentials.