The second step of the process continues on the New SAKA server. This step restores the database, verifies the credentials of the three Key Custodians, initializes the cryptographic hardware module and starts the process of migrating the appliance's master key to an existing appliance.
shell> service iptables restart
shell> scp saka01.<domain-name>:/usr/local/strongauth/dbdumps/strongkeylite-newserver.db /usr/local/strongauth/dbdumps
shell> mysql -u skles -p strongkeylite
mysql> source /usr/local/strongauth/dbdumps/strongkeylite-newserver.db
When the dump has finished sourcing, log out of mysql.if using payara6, use the following command: shell> sudo systemctl restart payara if using payara5, use the following command: shell> sudo service glassfishd restart
shell> cd /usr/local/strongauth/<payara-version>/glassfish/domains/domain1/logs
shell> tail -f server.log
In Window1, change directory to /usr/local/strongauth/bin
shell> cd ~/bin
shell> ./Secondary-SAKA-Setup-Wizard.sh
Follow the wizard steps to completion, ensuring there are no errors in Window1 or Window2. If there are any errors, determine the cause of the error, log out of the session, log back in as root and execute the cleanup.sh script to clean out the installation. Fix the cause of the error and start the installation process with Step 2.
NOTE: You will need the MASK from one of the exisiting SAKA during this step. This would have been created on the Black USB Token during the original cluster installation. If the Black USB is unavailable, a copy of the MASK file can be located at /usr/local/strongauth/strongkeylite/etc/FQDN-mask.xml on any existing SAKA. |
shell> sudo systemctl restart payara OR shell> sudo service glassfishd restart
shell> ./KC-SetPINTool.sh