vdsm的SSL证书验证过程
1. Copy the VDSM certificate of the RHEV-H(Red Hat Enterprise Virtualization Hypervisor ) host to the RHEV-M machine. This certificate should be in the host, inside the file /etc/pki/vdsm/certs/vdsmcert.pem.
譯:復制虛擬機管理平臺主機的vdsm證書到虛擬機管理中心的機器上,這個證書的位置在/etc/pki/vdsm/certs/vdsmcert.pem.
2. Once you have the VDSM certificate in the engine machine verify that it has been signed by the certificate authority of the engine:
譯:一旦在engineserver上有了vdsm證書,就能夠通過engineserver的CA驗證簽約情況
# openssl verify -CAfile /etc/pki/ovirt-engine/ca.pem vdsmcert.pemvdsmcert.pem: OKAs in the example above the result should be "OK", if you get any other thing then there is a problem.
3. Check that the CA certificate used by both RHEV-H and RHEV-M is the same. In RHEV-H it is inside /etc/pki/vdsm/certs/cacert.pem, in RHEV-M it is inside /etc/pki/ovirt-engine/ca.pem.
譯:驗證 RHEV-H與 RHEV-H的CA證書是否一樣,在RHEV-H 的位置:/etc/pki/vdsm/certs/cacert.pem。在RHEV-M的位置:/etc/pki/ovirt-engine/ca.pem
4. From the RHEV-M machine verify that you can establish a SSL connection to the VDSM running in the RHEV-H machine:
譯:驗證在RHEV-M上,能否夠建立到RHEV-H中的VDSM的SSL連接
# openssl s_client \
-connect the_ip_of_the_rhev_h:54321 \
-cert /etc/pki/ovirt-engine/certs/engine.cer \
-key /etc/pki/ovirt-engine/keys/engine_id_rsa \
-CAfile /etc/pki/ovirt-engine/ca.pem
轉(zhuǎn)載于:https://www.cnblogs.com/mfrbuaa/p/5121736.html
總結(jié)
以上是生活随笔為你收集整理的vdsm的SSL证书验证过程的全部內(nèi)容,希望文章能夠幫你解決所遇到的問題。
- 上一篇: Unity 3D 离线协议
- 下一篇: Android进阶笔记09:Androi