System information
About This Guide ...................................................................................................... vii
1. Who Should Read This Guide ........................................................................ vii
2. Required Information ..................................................................................... vii
3. What Is in This Guide .................................................................................... vii
4. Common Tool Information .............................................................................. ix
5. Additional Reading ......................................................................................... ix
6. Examples and Formatting ................................................................................x
7. Giving Feedback ............................................................................................xi
8. Revision History ............................................................................................ xii
1. Create and Remove Instance Tools ........................................................................ 1
1. pkicreate ....................................................................................................... 1
1.1. Syntax ................................................................................................ 1
1.2. Usage ................................................................................................ 3
2. pkiremove ..................................................................................................... 3
2.1. Syntax ................................................................................................ 3
2.2. Usage ................................................................................................ 3
2. Silent Installation .................................................................................................... 5
1. Syntax ........................................................................................................... 5
2. Usage ..........................................................................................................10
3. TokenInfo .............................................................................................................13
1. Syntax ..........................................................................................................13
4. SSLGet ................................................................................................................15
1. Syntax ..........................................................................................................15
2. Usage ..........................................................................................................15
5. AuditVerify ............................................................................................................17
1. About the AuditVerify Tool .............................................................................17
2. Setting up the Auditor's Database ..................................................................17
3. Syntax ..........................................................................................................18
4. Return Values ...............................................................................................19
5. Usage ..........................................................................................................19
6. PIN Generator ......................................................................................................21
1. The setpin Command ....................................................................................21
1.1. Editing the setpin.conf Configuration File .............................................21
1.2. Syntax ...............................................................................................22
1.3. Usage ...............................................................................................25
2. How setpin Works .........................................................................................25
2.1. Input File ...........................................................................................27
2.2. Output File .........................................................................................29
2.3. How PINs Are Stored in the Directory ..................................................29
2.4. Exit Codes .........................................................................................30
7. ASCII to Binary .....................................................................................................31
1. Syntax ..........................................................................................................31
2. Usage ..........................................................................................................31
8. Binary to ASCII .....................................................................................................33
1. Syntax ..........................................................................................................33
2. Usage ..........................................................................................................33
v