KEYSERV(8) | Maintenance Commands and Procedures | KEYSERV(8) |
keyserv - server for storing private encryption keys
keyserv [-c] [-d | -e] [-D] [-n] [-s sizespec]
keyserv is a daemon that is used for storing the private encryption keys of each user logged into the system. These encryption keys are used for accessing secure network services such as secure NFS.
Normally, root's key is read from the file /etc/.rootkey when the daemon is started. This is useful during power-fail reboots when no one is around to type a password.
keyserv does not start up if the system does not have a secure rpc domain configured. Set up the domain name by using the /usr/bin/domainname command. Usually the svc:/system/identity:domain service reads the domain from /etc/defaultdomain. Invoking the domainname command without arguments tells you if you have a domain set up.
The /etc/default/keyserv file contains the following default parameter settings. See .
ENABLE_NOBODY_KEYS
The following options are supported:
-c
-D
-d
-e
-n
-s sizespec
mechtype=size
size
/etc/.rootkey
/etc/default/keyserv
keylogin(1), keylogout(1), svcs(1), publickey(5), attributes(7), smf(7), svcadm(8)
The keyserv service is managed by the service management facility, smf(7), under the service identifier:
svc:/network/rpc/keyserv:default
Administrative actions on this service, such as enabling, disabling, or requesting restart, can be performed using svcadm(8). The service's status can be queried using the svcs(1) command.
February 25, 2017 | OmniOS |