After digital certificates
are generated for the CA, the server, and the client, and a CA trust
list for the client is created, you can start a UNIX spawner program
that runs on a server that
SAS/CONNECT clients connect to.
The following example
code starts the spawner using SSL encryption and specifies a private
password that must be provided either through prompting or within
a file:
% sastcpd -service unxspawn -netencryptalgorithm ssl
-sslcertloc /users/server/certificates/server.pem
-sslpvtkeyloc /users/server/certificates/serverkey.pem
-sslpvtkeypass starbuck1
-sslcalistloc /users/server/certificates/sas.pem
-sascmd /users/server/command.ksh
The following table
explains the SAS commands that are used to start a spawner on a
SAS/CONNECT single-user server.
SAS Commands and Arguments for Spawner Start-Up Tasks
SAS Commands and Arguments
|
|
|
|
|
Specifies the spawner
service (configured in the services file)
|
|
Specifies the SSL encryption
algorithm
|
-SSLCERTLOC /users/server/certificates/server.pem
|
Specifies the file path
for the location of the server's certificate
|
-SSLPVTKEYLOC /users/server/certificates/serverkey.pem
|
Specifies the file path
for the location of the server's private key
|
|
Specifies the password
to access the server's private key
|
-SSLCALISTLOC /users/server/certificates/sas.pem
|
Specifies the CA trust
list
|
-SASCMD /users/server/command.ksh
|
Specifies the name of
an executable file that starts a SAS session when you sign on without
a script file
|
In order for the UNIX
spawner to locate the appropriate server digital certificate, you
must specify the -SSLCERTLOC and -SSLPVTKEYLOC or the SSLPKCS12LOC
and SSLPKCS12PASS system options in the script that is specified by
the -SASCMD option.
For complete information
about starting a Windows spawner, see
Communications Access Methods for SAS/CONNECT and SAS/SHARE.
Here is an example
of an executable file:
#!/bin/ksh
#----------------------------------
# mystartup
#----------------------------------
. ~/.profile
sas -noterminal -sslcertloc /users/server/certificates/server.pem
-sslpvtkeyloc /users/server/certificates/serverkey.pem $*
#------------------------------