Rotate the Transient Credential Store Key | Teradata Query Service - Rotating the Transient Credential Store Key - Teradata Query Service
Teradata® Query Service Installation, Configuration, and Usage Guide for Customers - 4.01.03.01, 4.01.07.00
- Deployment
- VantageCloud
- VantageCore
- Edition
- VMware
- Enterprise
- IntelliFlex
- Product
- Teradata Query Service
- Release Number
- 4.01.03.01, 4.01.07.00
- Published
- September 2023
- ft:locale
- en-US
- ft:lastEdition
- 2024-08-02
- dita:mapPath
- qla1666844235399.ditamap
- dita:ditavalPath
- ft:empty
- dita:id
- enn1467244092237
- lifecycle
- latest
- Product Category
- Analytical Ecosystem
- Run /opt/teradata/rest/bin/keystore_admin.sh list.
- Run /opt/teradata/rest/bin/keystore_admin.sh create.
- If running multiple servers behind a load balancer, copy the file /etc/opt/teradata/rest/credentials.jks to the other servers.
- Wait until all outstanding tokens expire (default 2 hours).
- Run /opt/teradata/rest/bin/keystore_admin.sh delete id where id is the identification of the original private key entry id.
- If running multiple servers behind a load balancer, copy the file /etc/opt/teradata/rest/credentials.jks to the other servers.