Search

2.3. Installing and Uninstalling the Enterprise Security Client on Red Hat Enterprise Linux

download PDF

2.3.1. Installing the ESC Client

The first step in installing the Enterprise Security Client is to download the required packages. There are two ways to obtain the packages:
  • Downloading an ISO image from the Customer Portal.
  • Using the Red Hat yum utility
The preferred method of obtaining RPMs is using the yum command-line utility, as follows:
# yum install esc
If the yum command completes successfully, all of the necessary Enterprise Security Client RPMs and dependencies will be installed and ready for use.

Note

If you used the yum utility to install the Enterprise Security Client, there is no need for further installation; the client has already been installed. The following procedure is for installing from a CD image.
  1. As the root user, install the Enterprise Security Client packages:
    # yum install esc
The Enterprise Security Client is located in /usr/lib/esc-1.1.0 on Red Hat Enterprise Linux 32-bit systems and /usr/lib64/esc-1.1.0 on Red Hat Enterprise Linux 64-bit system. The esc shell script is installed in /usr/bin/esc. You can launch the Enterprise Security Client by running the esc command.
The Enterprise Security Client for Linux implements a daemon (escd) that runs silently, waiting for a smart card to be inserted. When an unenrolled smart card is inserted, the daemon automatically launches the client UI, and the Enterprise Security Client guides the user through the enrollment process. It is also possible to launch the client manually from the System menu, by selecting System Settings, then Smart Card Manager.

2.3.2. Uninstalling the ESC client

  1. Unplug all USB tokens.
  2. Stop the Enterprise Security Client.
  3. Log in as the root user, and use rpm -ev to remove the Enterprise Security Client RPM:
    # yum remove esc

    Note

    Update the version numbers of the RPM files to match your version.
  4. Remove any remaining files in the installation directory.
Red Hat logoGithubRedditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2024 Red Hat, Inc.