casverify

Verifies the configuration of specified components for an enterprise server region.

Syntax:

casverify {-r{server-name}|-l|-i{stage-id}} [-e{stage-id[,...]}] [-s:{w|c|u}] [-u{userid}] [-p{password}] [-z{userid}] [-c{group}] [-m{mfds-address}] [-o{config-name}] [-f{t|j}] [-a{w|e|s|f}] [-v{i|w|e|s}] [-d{trace-file}]

Parameters:

-r{server-name}
The name of the enterprise server region to be verified.
-l
Lists all the verification stages available and their coresponding stage-id.
-i[stage-id]
This parameter requires a specific stage-id and will return more information for that verification stage.
-e{stage-id[,...]}
Specifies a list of verification stages to execute. This can be a single stage-id or comma separated list of stage-id.
Note: The order in which the verification stages are executed might be different to the sequence that you specify. This is because some stages can be dependent on others.
-s:{w|c|u}
Verifies the enterprise server region in the context of how it is to be started in a PAC environment:
w
Warm start.
c
Cold start.
u
Upgrade mode.
-u{userid}
Specify an authorized user. This user must exist within the security domains of both the Enterprise Server and Micro Focus Directory Server. That is, the security configuration for both Enterprise Server and Directory Server must be able to verify the user credentials supplied.
Note: The Enterprise Server and Directory Server might be using different security managers. It might be necessary that the user is defined in more than one security repository.
-p{password}
The password for the user.
-z{userid}
The parameter enables you to pass user credentials through an interactive prompt or as a redirection from the console, the userid is optional. This can be used to pass credentials stored in the Vault Facility.
Note: Micro Focus recommends that you use this option in preference to -u and -p.
-c{group}
The sign-on group for the user. By default, when a user requests access to a resource, some external security managers only apply rules that refer to that user and the user's current sign-on group.

If this option is not specified, the user is signed on with a default group as determined by the security manager.

-m{mfds-address}
Host name and port number for the Directory Server. The default value is localhost:86.
-o{config-name}
Name of the SIT to use for the enterprise server region rather than the one specified in the Enterprise Server Common Web Administration (ESCWA) pages.
-f{t|j[u]}
Specifies the output format of the verification information:
t
Text
j
JSON

The default output value is t. Append u to receive regular JSON output.

-a{w|e|s|f}
Specifying this will abort the verification process on the first instance of a:
w
Warning
e
Error
s
Severe error
f
Fatal error

The default value is f.

Note: The verification process will abort if a more severe value is encountered. For example, a value of e is specified, however, a severe or fatal occurrence is encountered first.

Encountering a severe error will result in that verification stage ending but other verification stages not dependent on it can continue to run and carry out their own verification checks. Fatal errors will always result in subsequent verification stages failing to run.

-v{i|w|e|s}
Specifies the verbosity of the logging:
i
Information
w
Warning
e
Error
s
Severe

The default value is w, which will output warnings, errors, and severe messages.

-d{trace-file}
Enables auxiliary tracing which is written as a formatted text file to an specified trace-file location. The trace-file can be specified as a file with an absolute or relative path. A trace-file that contains spaces must be quoted.

Comments:

The casverify command will return a code, which correspond to the stage-id with the highest severity or internal error which has a return code below 100. If there are no verification issues then the return code will be set to 0.

This command must be run on the same machine that will run the specified enterprise server region with the same permissions used when executing the casstart command. The casverify command cannot be executed remotely.