Appearance
Key Generation
To generate a new key using default storage, issue the following as initiator administrator user:
sh
aelucrative-hype-initiator enstatewhich, in case of success will result in the following response:
Key has been generated successfullyWARNING
System-wide storage is the most secure and requires minimal configuration from the consumer, but system itself must be configured to receive HyPe Initiator operations.
Specific Storage
In case you want to generate a key in specified storage, supply --storage argument with the path to the target. This, effectively, allows to generate key in a form decoupled from the system storage. Useful in DevOps enviroment when key enrollment would happen seperately from deployment.
For example, for
- On per-user basis
- On a thumb-drive
sh
aelucrative-hype-initiator enstate --storage /media/username/mythumbDANGER
By default, generated key is owned by user issuing a command and doesn't have external encrypting envelope. This requires additional operation security when handling copies of the key. In particular, any third party can execute queries to Hyperpyron on your behalf. Immediately notify AElucrita in case your key has been compromised and should be blocked.