Chapter 2. Red Hat Update Agent
41
Refer to Section 6.4.7.2
Using Multiple Activation Keys at Once —
to understand
how differences in activation keys are handled.
The above command performs all the actions of the
Red Hat Network Registration Client
and the registration function of the
Red Hat Update Agent
. Do not run either of these
applications for registration after running
rhnreg_ks
.
A System Profile, including software and hardware information, is created for the system
and sent to the RHN Servers along with the unique activation key. The system is registered
with RHN under the account used to generate the key, entitled to an RHN service offering,
and subscribed to the RHN channels and system groups selected during key generation.
The system is not subscribed to channels that contain packages unsuitable for the system.
For example, a Red Hat Enterprise Linux 2.1 system cannot be subscribed to the Red Hat
Enterprise Linux 3 channel.
The unique Digital Certificate for the system is generated on the system in the file
/etc/sysconfig/rhn/systemid
.
When using activation keys to assign channels, consider these rules:
•
A key may specify either zero or one base channel. If specified, it must be a custom base
channel. If not, the base channel corresponding to the system’s Red Hat distribution is
chosen. For instance, you may not subscribe a Red Hat Enterprise Linux 2.1 system to
the Red Hat Enterprise Linux 3 channel.
•
A key may specify any number of child channels. For each child channel, subscription
is attempted. If the child channel matches the system’s base channel, subscription suc-
ceeds. If it does not, the subscription fails silently. Refer to Section 6.6
Channels
for
more information.
•
Keys may be modified by any user with the role of Activation Key Administrator or
Organization Administrator (or both). These permissions are set through the
Users
tab
of the RHN website. Refer to Section 6.8
Users —
for details.
•
Systems registered by activation keys are tied to the organization account in which the
key was created, not the key itself. After registration, a key can be deleted safely without
any effect on the systems it was used to register.
Содержание NETWORK 4.0 -
Страница 1: ...Red Hat Network 4 0 Reference Guide...
Страница 10: ......
Страница 16: ...vi Introduction to the Guide...
Страница 24: ...8 Chapter 1 Red Hat Network Overview...
Страница 40: ...24 Chapter 2 Red Hat Update Agent Figure 2 11 Available Package Updates...
Страница 58: ...42 Chapter 2 Red Hat Update Agent...
Страница 80: ...64 Chapter 5 Red Hat Network Registration Client Figure 5 15 Text Mode Welcome Screen...
Страница 186: ...170 Chapter 7 Monitoring...
Страница 200: ...184 Chapter 8 UNIX Support Guide...
Страница 214: ...198 Appendix A Command Line Config Management Tools...
Страница 274: ...258 Appendix C Probes...
Страница 282: ...266 Glossary...