iii
About This Guide vii
1. Required Concepts ........................................................................................................ vii
2. What Is in This Guide .................................................................................................... vii
3. Common Tool Information ............................................................................................... ix
4. Examples and Formatting ............................................................................................... ix
4.1. Formatting for Examples and Commands .............................................................. ix
4.2. Tool Locations ..................................................................................................... ix
4.3. Guide Formatting ................................................................................................. ix
5. Additional Reading .......................................................................................................... x
6. Giving Feedback ............................................................................................................ xi
7. Document History .......................................................................................................... xii
1. Create and Remove Instance Tools 1
1.1. pkicreate ...................................................................................................................... 1
1.1.1. Syntax .............................................................................................................. 1
1.1.2. Usage ............................................................................................................... 2
1.2. pkisilent ....................................................................................................................... 3
1.2.1. Syntax .............................................................................................................. 4
1.2.2. Usage ............................................................................................................... 7
1.3. pkiremove .................................................................................................................. 10
1.3.1. Syntax ............................................................................................................. 10
1.3.2. Usage ............................................................................................................. 10
2. TokenInfo 11
2.1. Syntax ....................................................................................................................... 11
3. SSLGet 13
3.1. Syntax ....................................................................................................................... 13
3.2. Usage ........................................................................................................................ 13
4. AuditVerify 15
4.1. About the AuditVerify Tool ........................................................................................... 15
4.2. Setting up the Auditor's Database ............................................................................... 15
4.3. Syntax ....................................................................................................................... 15
4.4. Return Values ............................................................................................................ 16
4.5. Usage ........................................................................................................................ 16
5. PIN Generator 17
5.1. The setpin Command ................................................................................................. 17
5.1.1. Editing the setpin.conf Configuration File ........................................................... 17
5.1.2. Syntax ............................................................................................................. 18
5.1.3. Usage ............................................................................................................. 19
5.2. How setpin Works ...................................................................................................... 19
5.2.1. Input File ......................................................................................................... 21
5.2.2. Output File ...................................................................................................... 22
5.2.3. How PINs Are Stored in the Directory ............................................................... 22
5.2.4. Exit Codes ...................................................................................................... 23
6. ASCII to Binary 25
6.1. Syntax ....................................................................................................................... 25
6.2. Usage ........................................................................................................................ 25
7. Binary to ASCII 27
7.1. Syntax ....................................................................................................................... 27
7.2. Usage ........................................................................................................................ 27