Chapter 2. Red Hat Update Agent
29
Note
GPG keys must be installed for each user. To install the key to use with Red Hat Network, import the
key while logged in as root.
The method for installing the key varies depending on your version of RPM. Starting with version
4.1, which shipped with Red Hat Enterprise Linux 3, you may import GPG keys using
rpm
, like so
(as root):
rpm --import /usr/share/doc/rpm-
4.1
/RPM-GPG-KEY
For older versions of RPM, such as the one that came with Red Hat Enterprise Linux 2.1, use the
gpg
command (as root):
/usr/bin/gpg --import /usr/share/rhn/RPM-GPG-KEY
If you need to download the Red Hat GPG key first, you may obtain it from
https://www.redhat.com/security/team/key.html . Here’s an example:
Type bits/keyID Date User ID
pub
1024D/650D5882 2001-11-21 Red Hat, Inc. (Security Response Team)
sub
2048g/7EAB9AFD 2001-11-21
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.2.1 (GNU/Linux)
mQGiBDv70vQRBADh701rf8WUzDG88kqlV/N5KQ1PF0amnODB/1EeuAD7n6bCBRmV
ekQWJCdfVsFg6IAAAmDIarVnacTLQzqCdGJqTpXm/mCh+OmT9
QRFbjSzB0uPJOpiIvJwSS00D/wJ8XKzHkVNgW3DiJ9Qz2BHYszU2ISI6FwCgxY6d
IVjWT5jblfR024ED/i0e2knetTHdGvP8Eds92Ti2CnJLaFJk
Rp749PucnK9mzxPcO2jSHgdtjWAXst/st+gWFVbFmkjBQDVSd00B/LN8
V7R8BElBmg99IlJmDvA2BI/seXvafhzly9bxSHScFnceco/Az9umIs3NXwv3/yOm
ZakDBAC6SAGHBmpVkOdeXJDdb4LcbEhErFU3CpRCjZ6AOnFuiV1MGdulZXvEUgBA
I6/PDE5nBHfZY3zPjyLPZVtgYioJpZqcRIx/g+bX2O8kPqvJEuZ19tLCdykfZGpy
bsV7QdSGqBk3snNOizmFj543RaHyEbnwKWbNADhuj7Q8UmVkIEhhdCwg
SW5jLiAoU2VjdXJpdHkgUmVzcG9uc2UgVGVhbSkgPHNlY2FsZXJ0QHJlZGhhdC5j
b20+iFcEExECABcFAj3GczYFCwcKAwQDFQMCAxYCAQIXgAAKCRBeVICDZQ1YghAU
AJoCeQfuMR2dKyLft/MNLQCggJgdO8MUO2y11TWID32InAQT
AQIABgUCPtyYpQAKCRDurUz9SaVj2e97A/0b2s7OhhAMljNwMQS4I2UWVGbgtxdu
D+yBcG/3mwL76NN/FSiQZZCL/4OFOHMvjzpTlBii
ZMAP0QaXxUgWlwW84GVf2rA6RSbvMLTbDjTH8t7J1RGP9zAqu8SgraTA
QbQdaohGBBMR3LjCAAoJECGRgM3bQqYOf5MAhDOj
9+jlR0qDs9lIi/C2AJ9SBBfd4A8hyR4z3lY7e0LzjWF519O3EAgA8tMs
xX78fMXh7LCvrL4HiAu81XJjDLNawZvpVmFlMmd9h0Xb5Jt2
BZWLR13rcDUByNdw1EWhVAzCz6Bp9Z3MIDhcP00iIBctIHn7YP9fi5vV0G03iryT
XE01mhWoBlC233wr3XHwsqxFfZzaCZPNfEAIzJRgtYiW8nzFTPpIR05E
oRn6EvmQfayOF2uYDX9Sk//lOD7T7RLtKjM/hPW/9NoCVUzVv4aelh1L
dJGEjpFtdxcrOUMD8xbkuGMzJ2BUDh5n57yOyEMaGrQ0jfY1ZqdqDvZg
osY1ZHa6KlmuCWNTnwADBQf/XYhCicp6iLetnPv6lYtyRfFRpnfThywC
t81P2nKv8lio6OsRbksGc1gX8Zl6GoHQYfDe7hYsCHZPoWErobECFds5E9M7cmzV
TTyNTvrELrs07mHcsYrn05kOPRJaBEBzP6B8SZKy
QNqEfTkTYU4Rbhkzz/UtqVjNbPKFpRraiQrUDsZFbgksBCzkzd0YURvi
CegO2K7JPKbZJo6eJA10qiBQvAx2EUijZfxIKqZeLx40EKMaL7Wa2CM/xmkQmCgg
Hyu5bmLSMZ7cxFSWyXOst78dehCKv9WyPxHV3m4iANWFL4hGBBgRA9O3
AAoJEF5UgINlDViCKWcAoMCeYStWVKXJTytzHEL6Wl8rXr8WAKCHuapJIA4/eFsf
4ciWtjY8cO0v8Q==
Summary of Contents for NETWORK 3.7 -
Page 1: ...Red Hat Network 3 7 Reference Guide...
Page 8: ......
Page 54: ...42 Chapter 4 Red Hat Network Alert Notification Tool...
Page 68: ...56 Chapter 5 Red Hat Network Registration Client...
Page 140: ...128 Chapter 7 Monitoring...
Page 148: ...136 Appendix A Command Line Config Management Tools...
Page 152: ...140 Appendix B RHN API Access...
Page 200: ...188 Glossary...
Page 208: ......