Red Hat CERTIFICATE SYSTEM 7.3 - COMMAND-LINE Información técnica Pagina 5

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 104
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 4
About This Guide ...................................................................................................... vii
1. Who Should Read This Guide ........................................................................ vii
2. Required Information ..................................................................................... vii
3. What Is in This Guide .................................................................................... vii
4. Common Tool Information .............................................................................. ix
5. Additional Reading ......................................................................................... ix
6. Examples and Formatting ................................................................................x
7. Giving Feedback ............................................................................................xi
8. Revision History ............................................................................................ xii
1. Create and Remove Instance Tools ........................................................................ 1
1. pkicreate ....................................................................................................... 1
1.1. Syntax ................................................................................................ 1
1.2. Usage ................................................................................................ 3
2. pkiremove ..................................................................................................... 3
2.1. Syntax ................................................................................................ 3
2.2. Usage ................................................................................................ 3
2. Silent Installation .................................................................................................... 5
1. Syntax ........................................................................................................... 5
2. Usage ..........................................................................................................10
3. TokenInfo .............................................................................................................13
1. Syntax ..........................................................................................................13
4. SSLGet ................................................................................................................15
1. Syntax ..........................................................................................................15
2. Usage ..........................................................................................................15
5. AuditVerify ............................................................................................................17
1. About the AuditVerify Tool .............................................................................17
2. Setting up the Auditor's Database ..................................................................17
3. Syntax ..........................................................................................................18
4. Return Values ...............................................................................................19
5. Usage ..........................................................................................................19
6. PIN Generator ......................................................................................................21
1. The setpin Command ....................................................................................21
1.1. Editing the setpin.conf Configuration File .............................................21
1.2. Syntax ...............................................................................................22
1.3. Usage ...............................................................................................25
2. How setpin Works .........................................................................................25
2.1. Input File ...........................................................................................27
2.2. Output File .........................................................................................29
2.3. How PINs Are Stored in the Directory ..................................................29
2.4. Exit Codes .........................................................................................30
7. ASCII to Binary .....................................................................................................31
1. Syntax ..........................................................................................................31
2. Usage ..........................................................................................................31
8. Binary to ASCII .....................................................................................................33
1. Syntax ..........................................................................................................33
2. Usage ..........................................................................................................33
v
Vista de pagina 4
1 2 3 4 5 6 7 8 9 10 ... 103 104

Comentarios a estos manuales

Sin comentarios