AIX 6 加密文件系统(Encrypted File System),第 5 部分:组管理
2008-09-06 08:20:02 来源:WEB开发网将组密钥存储库的访问密钥发送给用户
当在 root admin 模式中运行时,通过下面的示例 4 中所示的步骤,您可以使用 efskeymgr 命令将组存储库的访问密钥发送到用户密钥存储库:
user5 不拥有 gruop1 的访问密钥。
将组密钥存储库的访问密钥发送到用户密钥存储库。
现在,user5 已经将组密钥存储库的访问密钥加载到了他或者她自己的用户密钥存储库中。但是,不会自动地将该密钥加载到活动进程中。
示例 4 将组密钥存储库的访问密钥发送给用户
$ id uid=207(user5) gid=1(staff) groups=202(group1)
$ efskeymgr -v
Keystore content:
Keystore owner ............: uid 207
Keystore mode .............: admin:managed by EFS administrator
Password changed last on ..: 05/03/07 at 17:39:43
Private key:
Algorithm :RSA_1024
Fingerprint :49e42532:e8c471bf:2be9ba03:3f9d12b4:4ba01cea
Validity :This key is valid.
# id uid=0(root) gid=0(system)
groups=2(bin),3(sys),7(security),8(cron),10(audit),11(lp)
# efskeymgr -k group/group1 -s user/user5
$ id uid=207(user5) gid=1(staff) groups=202(group1)
$ efskeymgr -v
Keystore content:
Keystore owner ............: uid 207
Keystore mode .............: admin:managed by EFS administrator
Password changed last on ..: 05/03/07 at 17:39:43
Private key:
Algorithm :RSA_1024
Fingerprint :49e42532:e8c471bf:2be9ba03:3f9d12b4:4ba01cea
Validity :This key is valid.
Access key to keystore group/group1
$ efskeymgr -V
List of keys loaded in the current process:
Key #0:
Kind .....................User key
Id (uid / gid) ......... 207
Type .....................Private key
Algorithm ................RSA_1024
Validity .................Key is valid
Fingerprint ..............
49e42532:e8c471bf:2be9ba03:3f9d12b4:4ba01cea
更多精彩
赞助商链接