Enabling Authentication Services """""""""""""""""""""""""""""""" The Authentication Services must be configured in the specified order. The three steps required to complete authentication on the data grid: * Defining the Configuration Services * Defining the Data Services * Defining the Aggregation Services Enabling Authentication for Configuration Services ++++++++++++++++++++++++++++++++++++++++++++++++++ The following steps provide instruction for the configuration services steps required to enable authentication: 1. Enter the following commands: ``user@host:# yum install hawk-shard`` ``user@host:# cd /usr/local/hawk/data/hawk-shard && ./hawk-shard-config`` 2. Select option 2 for Manage Data Services. |Fig78| .. |Fig78| image:: /Manual_Install/images/Fig78.png :align: middle :scale: 70% 3. Select option 2 for Enable Authentication. |Fig79| .. |Fig79| image:: /Manual_Install/images/Fig79.png :align: middle :scale: 70% 4. Select option 1 for Configuration. |Fig80| .. |Fig80| image:: /Manual_Install/images/Fig80.png :align: middle :scale: 70% 5. If this is a new configuration, Select "Yes". if this is an existing configuration, go to section 7.4.2. |Fig81| .. |Fig81| image:: /Manual_Install/images/Fig81.png :align: middle :scale: 70% 6. For an initial configuration, a key is generated, and configuration process begins. When all aspects of the configuration are finalized, the completed notification dialog displays. |Fig82| .. |Fig82| image:: /Manual_Install/images/Fig82.png :align: middle :scale: 70% Enabling Authentication for Existing Configuration Services +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ The following steps provide instruction for the configuration services steps required to enable authentication: 1. Enter the following commands: ``user@host:# yum install hawk-shard`` ``user@host:# cd /usr/local/hawk/data/hawk-shard && ./hawk-shard-config`` 2. Select option 2 for Manage Data Services. |Fig78| .. |Fig78| image:: /Manual_Install/images/Fig78.png :align: middle :scale: 70% 3. Select option 2 for Enable Authentication. |Fig79| .. |Fig79| image:: /Manual_Install/images/Fig79.png :align: middle :scale: 70% 4. Select option 1 for Configuration. |Fig80| .. |Fig80| image:: /Manual_Install/images/Fig80.png :align: middle :scale: 70% 5. If this is an existing configuration, Select "No". |Fig83| .. |Fig83| image:: /Manual_Install/images/Fig83.png :align: middle :scale: 70% 6. Enter the peer address for an existing configuration service. |Fig84| .. |Fig84| image:: /Manual_Install/images/Fig84.png :align: middle :scale: 70% 9. Enter an existing peer SSH port for an existing configuration service. |Fig85| .. |Fig85| image:: /Manual_Install/images/Fig85.png :align: middle :scale: 70% .. note:: User needs to have read access to /etc/ 9. Enter the username for an existing configuration service. |Fig86| .. |Fig86| image:: /Manual_Install/images/Fig86.png :align: middle :scale: 70% 10. Enter the user password for the existing configuration service. |Fig87| .. |Fig87| image:: /Manual_Install/images/Fig87.png :align: middle :scale: 70% 11. The key file begins synchronization, and the configuration service restarts. Once that process has finished this completed notification dialog box displays. |Fig88| .. |Fig88| image:: /Manual_Install/images/Fig88.png :align: middle :scale: 70% Enabling Authentication for Data Services +++++++++++++++++++++++++++++++++++++++++ The following steps provide instruction for defining the data services that are the second series of steps required to enable authentication: 1. Enter the following commands: ``user@host:# yum install hawk-shard`` ``user@host:# cd /usr/local/hawk/data/hawk-shard && ./hawk-shard-config`` 2. Select option 2 for Manage Data Services. |Fig97| .. |Fig97| image:: /Manual_Install/images/Fig97.png :align: middle :scale: 70% 3. Select option 2 for Enable Authentication. |Fig98| .. |Fig98| image:: /Manual_Install/images/Fig98.png :align: middle :scale: 70% 4. Select option 3 for Data Services. |Fig99| .. |Fig99| image:: /Manual_Install/images/Fig99.png :align: middle :scale: 70% 5. Enter the shard's replica name. |Fig100| .. |Fig100| image:: /Manual_Install/images/Fig100.png :align: middle :scale: 70% 6. Enter the configuration peer host's IP address. |Fig101| .. |Fig101| image:: /Manual_Install/images/Fig101.png :align: middle :scale: 70% 7. Enter replica set's peer host SSH port. |Fig102| .. |Fig102| image:: /Manual_Install/images/Fig102.png :align: middle :scale: 70% 8. Enter the peer host username for the replica set. .. note:: Remember this user must have rights to access the keyfile. |Fig103| .. |Fig103| image:: /Manual_Install/images/Fig103.png :align: middle :scale: 70% 9. Enter the password for the replica set peer host. |Fig104| .. |Fig104| image:: /Manual_Install/images/Fig104.png :align: middle :scale: 70% 10. The key file begins synchronization, and then the configuration service restarts. Once that process has finished, the dialog box shown at the right is displayed noting the process has completed. |Fig105| .. |Fig105| image:: /Manual_Install/images/Fig105.png :align: middle :scale: 70% Enabling Authentication for Aggregation Services ++++++++++++++++++++++++++++++++++++++++++++++++ The following steps provide instruction for defining the aggregation services that are the third series steps required to enable authentication: 1. Enter the following commands: ``user@host:# yum install hawk-shard`` ``user@host:# cd /usr/local/hawk/data/hawk-shard && ./hawk-shard-config`` 2. Select option 2 for Manage Data Services. |Fig89| .. |Fig89| image:: /Manual_Install/images/Fig89.png :align: middle :scale: 70% 3. Select option 2 for Enable Authentication. |Fig90| .. |Fig90| image:: /Manual_Install/images/Fig90.png :align: middle :scale: 70% 4. Select option 2 for Aggregation. |Fig91| .. |Fig91| image:: /Manual_Install/images/Fig91.png :align: middle :scale: 70% 5. Enter the peer address for an existing configuration service. |Fig92| .. |Fig92| image:: /Manual_Install/images/Fig92.png :align: middle :scale: 70% 6. Enter an existing peer SSH port for an existing configuration service. |Fig93| .. |Fig93| image:: /Manual_Install/images/Fig93.png :align: middle :scale: 70% 7. Enter the peer host's password for the existing configuration service. |Fig94| .. |Fig94| image:: /Manual_Install/images/Fig94.png :align: middle :scale: 70% 8. Enter the peer host's password for the existing configuration service. |Fig95| .. |Fig95| image:: /Manual_Install/images/Fig95.png :align: middle :scale: 70% 9. The key file begins synchronization, and the configuration service restarts. Once that process has finished this completed notification dialog box displays. |Fig96| .. |Fig96| image:: /Manual_Install/images/Fig96.png :align: middle :scale: 70%