Skip to content

Key Generation

To generate a new key using default storage, issue the following as initiator administrator user:

sh
aelucrative-hype-initiator enstate

which, in case of success will result in the following response:

Key has been generated successfully

WARNING

System-wide storage is the most secure and requires minimal configuration from the consumer, but system itself must be configured to receive HyPe Initiator operations.

Specific Storage

In case you want to generate a key in specified storage, supply --storage argument with the path to the target. This, effectively, allows to generate key in a form decoupled from the system storage. Useful in DevOps enviroment when key enrollment would happen seperately from deployment.

For example, for

  • On per-user basis
  • On a thumb-drive
sh
aelucrative-hype-initiator enstate --storage /media/username/mythumb

DANGER

By default, generated key is owned by user issuing a command and doesn't have external encrypting envelope. This requires additional operation security when handling copies of the key. In particular, any third party can execute queries to Hyperpyron on your behalf. Immediately notify AElucrita in case your key has been compromised and should be blocked.