이 콘텐츠는 선택한 언어로 제공되지 않습니다.
13.2. PKI Instance Execution Management
The act of starting, stopping, restarting, or obtaining the status of a PKI instance is known as execution management. Each PKI instance, separate or shared, is started, stopped, restarted, and has its status obtained separately. This section describes the execution management for any PKI instance.
13.2.1. Starting, Stopping, and Restarting a PKI Instance 링크 복사링크가 클립보드에 복사되었습니다!
링크 복사링크가 클립보드에 복사되었습니다!
A PKI instance is started, stopped, and restarted like other system programs, using
systemd
.
- Log in to the server machine as
root
. - Run the
systemctl
command, specifying the action and the instance name:systemctl start|stop|restart pki-tomcatd@instance_name.service
systemctl start|stop|restart pki-tomcatd@instance_name.service
Copy to Clipboard Copied! Toggle word wrap Toggle overflow For example:systemctl restart pki-tomcatd@pki-tomcat.service
systemctl restart pki-tomcatd@pki-tomcat.service
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
13.2.2. Restarting a PKI Instance after a Machine Restart 링크 복사링크가 클립보드에 복사되었습니다!
링크 복사링크가 클립보드에 복사되었습니다!
If a computer running one or more PKI instances is shut down unexpectedly, more services than just the PKI instances must be restarted, in the proper order, for the subsystem to be available both through the HTML services page and the administrative console.
- If the Directory Server instance used by the subsystem is installed on the local machine, restart the Administration Server and the Directory Server processes.
systemctl start dirsrv-admin.service systemctl start dirsrv@instance_name.service
systemctl start dirsrv-admin.service systemctl start dirsrv@instance_name.service
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Start the Certificate System subsystem instances.
systemctl start pki-tomcatd@instance_name.service
systemctl start pki-tomcatd@instance_name.service
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
13.2.3. Checking the PKI Instance Status 링크 복사링크가 클립보드에 복사되었습니다!
링크 복사링크가 클립보드에 복사되었습니다!
The
systemctl
command can be used to check the status of a process, showing whether it is running or stopped. For example:
If the instance is running, the status check returns information similar to the following example:
13.2.4. Configuring a PKI Instance to Automatically Start Upon Reboot 링크 복사링크가 클립보드에 복사되었습니다!
링크 복사링크가 클립보드에 복사되었습니다!
The
systemctl
command can be used to automatically start instances upon reboot. For example, the following commands automatically start the Red Hat Administration Server, Directory Server, and a CA upon reboot:
systemctl enable dirsrv-admin.service systemctl enable dirsrv.target systemctl enable pki-tomcatd@pki-tomcat.service
# systemctl enable dirsrv-admin.service
# systemctl enable dirsrv.target
# systemctl enable pki-tomcatd@pki-tomcat.service
Note
The default PKI instance installation and configuration using the
pkispawn
command automatically enables the instance to start upon reboot.
To disable this behavior (that is, to prevent PKI instances from automatically starting upon reboot), issue the following commands:
systemctl disable pki-tomcatd@pki-tomcat.service systemctl disable dirsrv.target systemctl disable dirsrv-admin.service
# systemctl disable pki-tomcatd@pki-tomcat.service
# systemctl disable dirsrv.target
# systemctl disable dirsrv-admin.service
13.2.5. Setting sudo Permissions for Certificate System Services 링크 복사링크가 클립보드에 복사되었습니다!
링크 복사링크가 클립보드에 복사되었습니다!
For both simplicity of administration and security, the Certificate System and Directory Server processes can be configured so that PKI administrators (instead of only root) can start and stop the services.
A recommended option when setting up subsystems is to use a
pkiadmin
system group. (Details are in the Red Hat Certificate System 9 Planning, Installation, and Deployment Guide.) All of the operating system users which will be Certificate System administrators are then added to this group. If this pkiadmin
system group exists, then it can be granted sudo access to perform certain tasks.
- Edit the
/etc/sudoers
file; on Red Hat Enterprise Linux 7, this can be done using thevisudo
command:visudo
# visudo
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Depending on what is installed on the machine, add a line for the Directory Server, the Administration Server, PKI management tools, and each PKI subsystem instance, granting
sudo
rights to thepkiadmin
group:Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Important
Make sure to set sudo permissions for every Certificate System, Directory Server, and Administration Server on the machine — and only for those instances on the machine. There could be multiple instances of the same subsystem type on a machine or no instance of a subsystem type. It depends on the deployment.