Product Documentation
  1. Log into the appliance as strongauth user.
  2. Start a shell window.
  3. Change directory to /usr/local/strongauth/bin.
    shell> cd ~/bin
  4. Execute KMTool.sh.

    shell> ./KMTool.sh
  5. The three Key Custodians and the Domain Administrator must now authenticate themselves to the appliance in the Validate Credentials panel of the KMTool.
  6. In the second panel of KMTool ‘Migrate a key from this appliance’ specify a MASK file from New SAKA and create migration keyfile.
    If the migration key is generated successfully, KMTool will produce the following message: “Migrated Encryption Domain #1's master-key to [target-appliance-FQDN].”

    https://demo4.strongkey.com/getstarted/assets/documents/HTML/images/key_strong_cyan.pngNOTE: Additional EDKs can be migrated from other domains before closing KMTool. To migrate another EDK, validate the DA from the extra domain (don't forget to change the DID field). After validating the domain, click Migrate again to generate another migration key for this extra domain. This process can be repeated for each other domain.

  7. Click Exit to close KMTool.
  8. Log out of SAKA.