Configuring the First KeyControl Node

You need to configure the KeyControl instance using SSH before you can use the KeyControl webGUI to configure and maintain your KeyControl cluster.

The following procedure describes how to configure the first KeyControl node in the cluster. If you are adding this node to an existing cluster, see Configuring Additional KeyControl Nodes.

Before You Begin 

Make sure you have the following information:

  • The Amazon instance ID for the KeyControl instance.
  • The Elastic (Public) IP address associated with the instance.
  • The private key file (in pem format) that was used when the instance was created.

Tip: To find this information, select Instances from the Amazon Management Console EC2 Dashboard, then select the KeyControl instance in the table. In the Description tab, look at the Instance ID, IPv4 Public IP, and Key pair name fields.

Procedure 

  1. To initialize KeyControl for this cluster, do the following:

    1. Use a web browser to navigate to https://<Elastic-IP-addy>, where <Elastic-IP-addy> is the Elastic IP address associated with the KeyControl AWS instance. For security reasons, you must explicitly specify https:// in the URL.
    2. If prompted, add a security exception for the KeyControl IP address and proceed to the KeyControl Vault Management webGUI.

      KeyControl uses its own Root Certificate Authority to create its security certificate, which means that certificate will not be recognized by the browser. For details, see KeyControl Certificates.

    3. On the Entrust KeyControl Vault Management login, enter secroot for the username and the AWS instance ID as the password.
    4. Review the EULA (end user license agreement). When you are done, click I Agree to accept the license terms.
    5. On the Welcome to KeyControl screen, click Continue as a Standalone Node.
    6. On the Change Password page, enter a new password for the secroot account and click Update Password.

    7. On the Configure E-Mail and Mail Server Settings page, specify your email settings.

      If you specify an email address, KeyControl sends an email with the Admin Key for the new node. It also sends system alerts to this email address.

      To disable alerts, select the Disable e-mail notifications checkbox. You are then prompted to download the Admin Key.

    8. When you are done, click Continue.

    9. On the Download Admin Key page, click the Download button to save the admin key locally. Please keep the admin key in a safe place for later use. When KeyControl prompts for an admin key to recover your KeyControl system, you must provide this admin key to proceed. If you do not have your admin key, you may lose your data.

      Note: Whenever the admin key is regenerated, KeyControl forces you to download the admin key.

    10. When you are finished, click Continue.

      KeyControl displays the KeyControl Vault Management webGUI. For details about the tasks you can perform from the webGUI, see the Administration Guide.

  2. Optional. Log into the htadmin account on the keycontrol System Console using the private key file. For example: 

    ssh -i <key-file>.pem htadmin@<Elastic-IP-addy>

    The password is the same as the secroot password that you changed in step f above.

    Important: The secroot password is used for this first login. You can either change it, or leave it as is. If you change the htadmin password in the System Console, it only changes the password for this particular node, and does not affect the secroot password.

What to Do Next