skip book previous and next navigation links
go up to top of book: HP OpenVMS Alpha Version 7.3-2 Upgrade and Installation... HP OpenVMS Alpha Version 7.3-2 Upgrade and Installation...
go to beginning of chapter: After Installing the OpenVMS Alpha Operating System After Installing the OpenVMS Alpha Operating System
go to previous page: Customizing the System Customizing the System
go to next page: Configuring KerberosConfiguring Kerberos
end of book navigation links

Initializing CDSA  



The Common Data Security Architecture (CDSA) is automatically installed with the operating system. However, use of CDSA is not required. If you do not plan to use CDSA or any products that depend on it, you can skip to the next section.

If you do plan to use CDSA, you must execute the following command to perform a one-time configuration procedure. Execute the command from an account that has both SYSPRV and CMKRNL privileges (for example, the SYSTEM account).

$ @SYS$STARTUP:CDSA$INITIALIZE

NoteDo not attempt to remove CDSA from your system. The PRODUCT REMOVE command is not supported for CDSA even though there appears to be an option to remove CDSA. CDSA is installed with the operating system and is tightly bound with it. Any attempt to remove it will not work cleanly, and could create undesirable side effects. An attempt to remove it results in a message similar to the following:
%PCSI-E-HRDREF, product CPQ AXPVMS CDSA V2.0 is referenced 
   by DEC AXPVMS OPENVMS V7.3-2
 -PCSI-E-HRDRF1, the two products are tightly bound by this
   software dependency 
 -PCSI-E-HRDF2, if you override the recommendation to terminate the operation,
 -PCSI-E-HRDF3, the referenced product will be removed, but the referencing
 -PCSI-E-HRDF4, product may no longer function correctly; please review
 -PCSI-E-HRDF5, dependency requirements for the referencing product
 Terminating is strongly recommended. Do you want to terminate? [YES]

For more information about CDSA, see HP Open Source Security for OpenVMS, Volume 1: Common Data Security Architecture.
go to previous page: Customizing the System Customizing the System
go to next page: Configuring KerberosConfiguring Kerberos