Link Search Menu Expand Document
Start for Free

stardog-admin encryption list-keys

Description

List all of the encryption keys.

Usage

stardog-admin [ --krb5 ] [ --krb5-disable-rdns ] [ --server <server url> ] encryption list-keys [ {-E | --enc-password} <password> ] [ {-p | --passwd} <password> ] [ {-P | --ask-password} ] [ {-R | --read-password} ] [ --run-as <username> ] [ {-u | --username} <username> ] [ {-v | --verbose} ]

Options

Name, shorthand Description
-E <password>, --enc-password <password> The current encryption password.
--krb5 Use the Kerberos environment.
--krb5-disable-rdns Disable reverse DNS lookup for Kerberos clients.
-p <password>, --passwd <password> Password.
-P, --ask-password Prompt for password.
-R, --read-password Read the encryption password from the console.
--run-as <username> User to impersonate when running the command
--server <server url> URL of Stardog Server. If this option isn’t specified, it will be read from JVM argument ‘stardog.default.cli.server’. If the JVM arg isn’t set, the default value ‘http://localhost:5820’ is used. If server URL has no explicit port value, the default port value ‘5820’ is used. Example: ‘stardog-admin –server http://12.34.56.78:5820 server stop’
-u <username>, --username <username> User name.
-v, --verbose Flag that can cause more detailed information to be printed such as errors and status. Exact output depends upon the command and options used.

Discussion

This command will list all of the keys that were created by the new-key command. If an encryption password is in use it must be provided to this command.

Examples

List the encryption keys:

$ stardog-admin encryption list-keys -E <password>