1
edit
Changes
no edit summary
* login as sigul:
* generate a new NSS database for the bridge at the location of the bridge_dir variable
2) Now generate the CA (Certificate Authority) certificate, to be used accross all sigul components
* be sure to replace '''my-ca''' with whatever your desire your CA to be named, such as '''sigul-ca''' for example:
3) Create a certificate for the bridge
* be sure to replace BRIDGE_HOSTNAME with the hostname of the machine it resides on:
4) Now it is time to configure the bridge, edit the config at ''/etc/sigul/bridge.conf'' * AS '''ROOT'''
* login as ROOT
* edit ''/etc/sigul/bridge.conf'':
5) After editing the config and setting up the certs, it is time for a test drive issue the following * AS '''ROOT''':
* start the bridge in DEBUG mode, and all information will be logged in ''/var/log/sigul_bridge.log'':
* check the log file after starting sigul, if there are no errors you are good to go.
** you should see the first log message in ''/var/log/sigul_bridge.log'':
* stop the sigul_bridge CRTL-C and start the service:
=Sigul Server Setup=
Add bridge hostname to /etc/hosts:
1) Create the NSS database on the server, to hold the certificate information *AS user '''sigul''' issue the following
* login as sigul:
* generate a new NSS database for the server at the location of the server_dir variable:
2) Now import the CA (Certificate Authority) certificate, generated earlier on the bridge
* issue ON THE BRIDGE as user '''sigul''':
* copy ''myca-server.p12'' over to the server and deleted from the bridge afterwards
* issue ON THE SERVER as user '''sigul''':
* The sigul CA certs should now be imported
* be sure to replace SERVER_HOSTNAME with the hostname of the machine it resides on:
3) Now it is time to configure the server, edit the config at ''/etc/sigul/server.conf'' * AS '''ROOT'''
* login as ROOT
* edit ''/etc/sigul/server.conf''
4) Now to create the database for the server which will hold all user and key entries issue the following * AS '''ROOT'''
5) Next Add the initial administrator * AS '''ROOT'''
6) After all is configured, it's time for a test drive * AS '''ROOT''':
* start the server in DEBUG mode, and all information will be logged in ''/var/log/sigul_server'':
* check the log file after starting sigul, if there are no errors you are good to go.
* you should see the first log message in /var/log/sigul_server.log:
* stop the sigul_server CRTL-C and start the service:
=Sigul Client Setup=
Add hostnames to /etc/hosts:
To begin setup, we have to follow a similar process to the bridge with NSS, except that we will import the CA cert generated on the bridge, not generate a new one.
* generate a new NSS database for the server at the location of the client_dir variable
2) Now import the CA (Certificate Authority) certificate, generated earlier on the bridge
* issue ON THE BRIDGE as user '''sigul'''
* copy ''myca-client.p12'' over to the client and deleted from the bridge afterwards
* issue ON THE CLIENT as your own user
3) Next we have to generate the authentication certificate for the client
* be sure to replace YOURUSERNAME with the user you are using on the client system
* OR set 'CN=YOUR FAS NAME' if using FAS authentication
4) Now it is time to configure the client, edit the config at /etc/sigul/client.conf * AS '''ROOT'''
* login as ROOT
* edit ''/etc/sigul/client.conf''
* if you wish to avoid entering an NSS password upon issuing each command, create/edit ''~/.sigul/client.conf'' and add the following lines:
5) After configuring your client, issue a test client command in DEBUG mode as follows:
* This should return a list of users on the server, at this point it should only really display the one admin user created before
* Help on more commands:
6) Create an initial key once you are able to issue commands to sigul, issue the following:
* this will output the options that can be used with the key creation, use the ones you want, and generate the key.
* please note when generating the key, it requires alot of Entropy on the server, so issue some commands to keep server busy and help it generate faster, usually a simple find / will generate enough for it to take about 2 minutes to generate the key.
1) As ROOT on the sigul bridge, edit /etc/sigul/bridge.conf edit the koji section as follows:
2) The koji configuration file and certs can reside under any directory that sigul has atleast read privileges on. The kojiweb certificates that allow kojiweb to authenticate with koji must be copied to this directory, along with the config file which points to the koji instance, as well as the kojiweb certs needed for it to authenticate.
4) To test issue the following on the client, to download and RPM from koji - sign it - and store it locally - Just as a test for koji connectivity and authentication:
=Sigul Client Config Script=