In the fourth step of the process, which occurs on the New StrongKey Tellaro node, the process completes the key-migration process for the domain keys migrated in the previous step.
- Login as 'strongauth' into the StrongKey Tellaro
- Startup 2 shell windows
- In Window2, go the /usr/local/strongauth/<payara-version>/glassfish/domains/domain1/logs directory
shell> aslg
Or
shell> cd /usr/local/strongauth/<payara-version>/glassfish/domains/domain1/logs
- In Window2, run the tail -f command on the server.log file
shell> tail -f server.log
- In Window1, change directory to /usr/local/strongauth/bin
shell> cd ~/bin
- In Window1, execute the KMTool.sh
shell> ./KMTool.sh
- Using KeyCustodian flash-drives, set the PINs for the required minimum number of Key Custodians to authorize access to the TPM.
Select a domain to migrate the key to and use the Domain Administrator's Credentials to authorize the migration of the Encryption Domain Key.
Using the MigKey file generated in Step #3, import the Migration Key Blob.
Repeat these steps for each domain key to be imported.
- Please generate JWT Signing Keys to add certificates for new DR node:
shell> /usr/local/software/saka/keygen-jwt.sh <JWT_KEYGEN_DN> <COUNT OF SERVERS> <JWT_CERTS_PER_SERVER> <DID> <JWT_KEYSTORE_PASSWORD> <JWT_KEY_VALIDITY>
- Import the OpenLDAP users and groups using the backup taken during the Step #1 and copied over in the step N-1-14:
shell> /usr/local/strongauth/bin/restore-backup.sh <backup-directory> <backup_configFile> <backup_databaseLDIF>
- In Window 1, restart the Glassfish application server
shell> sudo service glassfishd restart
- In Window1, execute the KC-SetPINTool.sh
shell> ./KC-SetPINTool.sh
- Using the KeyCustodian flash-drives, set the PINs for the required minimum number of Key Custodians to activate the cryptographic hardware module on the appliance, ensuring there are no errors in Window1 or Window2
- Now that the Encryption Domain Keys have been imported, the node is ready to accept cryptographic requests. In order for Ping requests to function properly, a first dummy record must be encrypted on this node for each domain.
In Window1, change directory to the /usr/local/strongauth/topaz directory:
shell> cd ~/topaz
- In Window1, execute the sakaclient.jar client application as follows for every domain-id (DID). This command will encrypt one credit-card number (with a dummy number of 1111222233334444) and then attempt to decrypt the returned value immediately:
shell> java -jar /usr/local/strongauth/topaz/sakaclient.jar https://<FQDN>:8181 <domain-id> <username> <password> B 33334444 1
Ensure the token returned is the first token for SID of the new server.
- In Window1, verify Ping requests work for every domain-id (DID):
shell> java -cp /usr/local/strongauth/topaz/sakamclient.jar ping https://<FQDN>:8181 <DID> <'pinguser' password>
- In Window1, verify Authentication requests work for every domain using the user registered in Step #1.
shell> java -jar /usr/local/strongauth/topaz/skfsclient.jar A <hostport> <did> <wsprotocol> <authtype> [ <accesskey> <secretkey> | <svcusername> <svcpassword> ] <username> <origin> <authcounter> <crossorigin>
- This concludes the installation and configuration of Data Recovery StrongKey Tellaro node. Now, this new node should be shutdown and stored at a safe location accessible only with certain privileges.