Your browser does not allow storing cookies. We recommend enabling them.

PreviousNextUp[Front page] [Index]


The usage is the following:

ssh-ca-tool [DSN] [options]

Before ssh-ca-tool can be run, some environment variables must be initialized and the Database must be started by running:

. ./bin/ssh-ca-runenv
. ./bin/ssh-ca-dbstart

Afterwards the Database should be stopper by running:

. ./bin/ssh-ca-dbstop

Alternatively, each ssh-ca-tool command line can be run with ssh-ca-runenv wrapper. Example:

./bin/ssh-ca-runenv -db ssh-ca-tool -r /tmp/my-entropy.tmp

In this case, the ssh-ca-runenv wrapper shuts down SSH Tectia Certifier (if it was running), starts the Database, runs the ssh-ca-tool command, and finally stops the Database.

The optional first parameter that ssh-ca-tool requires is the data source name that indicates the database in use. This is given as a string, such as DSN=certifier if certifier is the name configured in the ODBC connection to the database.

PreviousNextUp[Front page] [Index]


What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now