Product Documentation
  1. Log into the appliance as strongauth user.
  2. Start a shell window.
  3. Change directory to /usr/local/strongauth/bin.
    shell> cd ~/bin
  4.  Execute KMTool.sh.

    shell> ./KMTool.sh
  5. The three Key Custodians and the Domain Administrator must now authenticate themselves to the appliance in the Validate Credentials panel of the KMTool.

  6. In the third panel of KMTool ‘Import a migrating key to this appliance’ specify a MASK file from EOL SAKA and import migration keyfile.
    If the process works correctly, you will see a message indicating success: “Successfully imported migrating key to this SAKA.”

    https://demo4.strongkey.com/getstarted/assets/documents/HTML/images/key_strong_cyan.pngNOTE: Additional EDKs can be imported from other domains before closing KMTool. To import another EDK, validate the DA from the extra domain (don't forget to change the DID field). After validating the domain, click Import again to import another migration key for this extra domain. This process can be repeated for each other domain.

  7.  Click Exit to close KMTool.

  8. Copy over configuration files from EOL SAKA to New SAKA under same directory.
    /usr/local/strongauth/appliance/etc/appliance-configuration.properties
    /usr/local/strongauth/strongkeylite/etc/strongkeylite-configuration.properties
    /usr/local/strongauth/crypto/etc/crypto-configuration.properties
    /usr/local/strongauth/skce/etc/skce-configuration.properties
    /usr/local/strongauth/skcc/etc/skcc-configuration.properties
    /usr/local/strongauth/fso/etc/fso-configuration.properties
    /usr/local/strongauth/skfs/etc/skfs-configuration.properties
  9. Restart Glassfish/Payara.
    shell> sudo service glassfishd restart
  10. Set KC-PINs.
    shell> KC-SetPINTool.sh
  11. Test functionality:
    shell> pingsaka.sh [hostname] did [password]
  12. Log out of SAKA.