Introduction
Application Scenarios
By running the adc command, the system implements functions such as file transfer, log level setting, and heartbeat detection through the communication between the Ascend Debug Agent (ADA) in the operating environment and the Ascend Debug Client (ADC). When the ADC interacts with the ADA, keys and certificates are used to implement two-way authentication between them.
- ADC: Ascend Debug Client. The corresponding command name is adc.
- ADA: Ascend Debug Agent. The corresponding process name is ada.
- ADX: Ascend Debug For X, a module name
List of Key Certificates
- Log in to the operating environment as the ada process running user and view the certificates or keys in the ~/ide_daemon directory.
- Log in to the server where Toolkit is installed as the running user of Toolkit and view the certificates or keys in the Toolkit installation directory/toolkit/tools/ide_daemon/conf directory.
- Before commercialization, you need to apply for a certificate from a third-party organization to replace the default certificate in Table 7-12. Otherwise, security risks may exist.
- In the test phase, if you use the default certificates or keys provided by the system, ensure that the time of the server where the ADC is installed and the server where the ADA is installed is within the certificate validity period (from 2018-12-13 10:40:19 GMT to 2028-12-10 10:40:19 GMT).
Location |
Certificate/Key Name |
Purpose |
Encryption Supported |
---|---|---|---|
Server |
ide_daemon_server_key.pem |
Private key of the server |
Yes |
Server |
ide_daemon_server_cert.pem |
Server certificate |
No |
Client |
ide_daemon_client_key.pem |
Private key of the client |
Yes |
Client |
ide_daemon_client_cert.pem |
Client certificate |
No |
Client/Server |
ide_daemon_cacert.pem |
CA certificate |
No |
Certificate Obtaining Method
Obtain a new certificate in either of the following ways:
- In the test phase, install the third-party OpenSSL tool and the keytool tool provided by the JDK in advance to make certificates and keys, including the certificates and keys of the server and client.
- For commercialization, apply for a security certificate from a third-party organization.