Questo contenuto non è disponibile nella lingua selezionata.
13.9. Running Self-Tests
The Certificate System has the added functionality to allow self-tests of the server. The self-tests are run at start up and can also be run on demand. The startup self-tests run when the server starts and keep the server from starting if a critical self-test fails. The on-demand self-tests are run by clicking the self-tests button in the subsystem console.
13.9.1. Running Self-Tests Copia collegamentoCollegamento copiato negli appunti!
Copia collegamentoCollegamento copiato negli appunti!
The on-demand self-test for the CA, OCSP, KRA, or TKS subsystems are run from the console. The on-demand self-tests for the TPS system are run from the web services page.
13.9.1.1. Running Self-Tests from the Console Copia collegamentoCollegamento copiato negli appunti!
Copia collegamentoCollegamento copiato negli appunti!
- Log into the Console.
pkiconsole https://server.example.com:admin_port/subsystem_type
pkiconsole https://server.example.com:admin_port/subsystem_type
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Select the subsystem name at the top of the left pane.
- Select the Self Tests tab.
- Click.The self-tests that are configured for the subsystem will run. If any critical self-tests fail, the server will stop.
- The On-Demand Self Tests Results window appears, showing the logged events for this run of the self-tests.
13.9.1.2. Running TPS Self-Tests Copia collegamentoCollegamento copiato negli appunti!
Copia collegamentoCollegamento copiato negli appunti!
To run TPS self-tests from the command-line interface (CLI):
pki tps-selftest-find
pki tps-selftest-run
pki tps-selftest-show
13.9.2. Self-Test Logging Copia collegamentoCollegamento copiato negli appunti!
Copia collegamentoCollegamento copiato negli appunti!
A separate log,
selftest.log
, is added to the log directory that contains reports for both the start up self-tests and the on-demand self-tests. This log is configured by changing the setting for the log in the CS.cfg
file. For more information, see Modifying Self-Test Configuration.
13.9.3. Configuring POSIX System ACLs Copia collegamentoCollegamento copiato negli appunti!
Copia collegamentoCollegamento copiato negli appunti!
POSIX system access control rules provide finer granularity over system user permissions. These ACLs must be set for each instance after it is fully configured. For more details on ACLs, see Configuring ACLs.
13.9.3.1. Setting POSIX System ACLs for the CA, KRA, OCSP, TKS, and TPS Copia collegamentoCollegamento copiato negli appunti!
Copia collegamentoCollegamento copiato negli appunti!
Modern file systems like ext4 and XFS enable ACLs by default, and are most likely used on modern Red Hat Enterprise Linux installations.
- Stop the instance.
systemctl stop pki-tomcatd@instance_name.service
systemctl stop pki-tomcatd@instance_name.service
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Set the group readability to the pkiadmin group for the instance's directories and files.
setfacl -R -L -m g:pkiadmin:r,d:g:pkiadmin:r /var/lib/pki/instance_name
# setfacl -R -L -m g:pkiadmin:r,d:g:pkiadmin:r /var/lib/pki/instance_name
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Apply execute (x) ACL permissions on all directories:
find -L /var/lib/pki/instance_name -type d -exec setfacl -L -n -m g:pkiadmin:rx,d:g:pkiadmin:rx {} \;
# find -L /var/lib/pki/instance_name -type d -exec setfacl -L -n -m g:pkiadmin:rx,d:g:pkiadmin:rx {} \;
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Remove group readability for the pkiadmin group from the instance's signedAudit/ directory and its associated files:
setfacl -R -L -x g:pkiadmin,d:g:pkiadmin /var/lib/pki/instance_name/logs/signedAudit
# setfacl -R -L -x g:pkiadmin,d:g:pkiadmin /var/lib/pki/instance_name/logs/signedAudit
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Set group readability for the pkiaudit group for the instance's signedAudit/ directory and its associated files:
setfacl -R -L -m g:pkiaudit:r,d:g:pkiaudit:r /var/lib/pki/instance_name/logs/signedAudit
# setfacl -R -L -m g:pkiaudit:r,d:g:pkiaudit:r /var/lib/pki/instance_name/logs/signedAudit
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Re-apply execute (x) ACL permissions on the signedAudit/ directory and all of its subdirectories:
find -L /var/lib/pki/instance_name/logs/signedAudit -type d -exec setfacl -L -n -m g:pkiaudit:rx,d:g:pkiaudit:rx {} \;
# find -L /var/lib/pki/instance_name/logs/signedAudit -type d -exec setfacl -L -n -m g:pkiaudit:rx,d:g:pkiaudit:rx {} \;
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Start the instance.
systemctl start pki-tomcatd@instance_name.service
systemctl start pki-tomcatd@instance_name.service
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Confirm that the file access controls were properly applied by using the
getfacl
command to show the current ACL settings:Copy to Clipboard Copied! Toggle word wrap Toggle overflow