Hostname Identification and Resolution
                                                            
                                                        Prior to the installation of Keyfactor Command, you need to determine the DNS The Domain Name System is a service that translates names into IP addresses. alias(es) by which the Keyfactor Command roles will be accessed, if any, and configure them in your hostname
 The Domain Name System is a service that translates names into IP addresses. alias(es) by which the Keyfactor Command roles will be accessed, if any, and configure them in your hostname The unique identifier that serves as name of a computer. It is sometimes presented as a fully qualified domain name (e.g. servername.keyexample.com) and sometimes just as a short name (e.g. servername). resolution solution so that they will be resolvable prior to installation. For example, if you’re licensed for SSH
 The unique identifier that serves as name of a computer. It is sometimes presented as a fully qualified domain name (e.g. servername.keyexample.com) and sometimes just as a short name (e.g. servername). resolution solution so that they will be resolvable prior to installation. For example, if you’re licensed for SSH The SSH (secure shell) protocol provides for secure connections between computers. It provides several options for authentication, including public key, and protects the communications with strong encryption. key management and wish to publish the My SSH Key portal externally to support SSH key acquisition by users outside the company firewall, you will probably wish to reference the server by a DNS alias rather than its actual hostname. For example, you may wish to use keyfactor.keyexample.com rather than websrvr23.keyexample.local. This is particularly significant if you will be using redundant servers with load balancing. For DNS aliases used internally, you will need to consider whether the servers to be accessed will be authenticated using Kerberos authentication. Out of the box, the Keyfactor Command Management Portal uses integrated Windows authentication and will default to Kerberos authentication in most environments. Although some features of the Keyfactor Command Management Portal may support NTLM authentication in some environments, the dashboard and enrollment
 The SSH (secure shell) protocol provides for secure connections between computers. It provides several options for authentication, including public key, and protects the communications with strong encryption. key management and wish to publish the My SSH Key portal externally to support SSH key acquisition by users outside the company firewall, you will probably wish to reference the server by a DNS alias rather than its actual hostname. For example, you may wish to use keyfactor.keyexample.com rather than websrvr23.keyexample.local. This is particularly significant if you will be using redundant servers with load balancing. For DNS aliases used internally, you will need to consider whether the servers to be accessed will be authenticated using Kerberos authentication. Out of the box, the Keyfactor Command Management Portal uses integrated Windows authentication and will default to Kerberos authentication in most environments. Although some features of the Keyfactor Command Management Portal may support NTLM authentication in some environments, the dashboard and enrollment Certificate enrollment refers to the process by which a user requests a digital certificate. The user must submit the request to a certificate authority (CA). functions do not support NTLM. If you will be using Kerberos authentication, your DNS aliases need to be configured as “A” records rather than CNAME records because Kerberos does not function well with CNAME records under Microsoft IIS.
 Certificate enrollment refers to the process by which a user requests a digital certificate. The user must submit the request to a certificate authority (CA). functions do not support NTLM. If you will be using Kerberos authentication, your DNS aliases need to be configured as “A” records rather than CNAME records because Kerberos does not function well with CNAME records under Microsoft IIS.
The roles for which you need hostnames during the Keyfactor Command installation are:
 SQL Server
SQL Server
                                                            For a small environment you may choose to use the server’s actual name. If you plan to use SQL clustering, you will need an alias that represents the cluster. Using an alias for the SQL server allows for database portability in the future.
 Email
Email
                                                            During the Keyfactor Command installation you configure the email server that will be used to send email notifications.
 Keyfactor Command Management Portal
Keyfactor Command Management Portal
                                                            This is the primary management server and may hold all Keyfactor Command roles in a small implementation.
 Keyfactor Command Logi Dashboard and Reports
Keyfactor Command Logi Dashboard and Reports
                                                            This hostname must match the hostname entered for the Management Portal.
 Keyfactor Command vSCEP Service
Keyfactor Command vSCEP Service
                                                            This hostname is only required if your Keyfactor Command license includes vSCEP™. If all Keyfactor Command roles are combined on one server, this will be the same hostname as used for the Keyfactor Command Management Portal.
 Keyfactor Command Orchestrators API
Keyfactor Command Orchestrators API
                                                            This hostname is only required if your Keyfactor Command license includes orchestrator Keyfactor orchestrators perform a variety of functions, including managing certificate stores and SSH key stores. functionality. If all Keyfactor Command roles are combined on one server, this will be the same hostname as used for the Keyfactor Command Management Portal.
 Keyfactor orchestrators perform a variety of functions, including managing certificate stores and SSH key stores. functionality. If all Keyfactor Command roles are combined on one server, this will be the same hostname as used for the Keyfactor Command Management Portal.
 Keyfactor Command Keyfactor API
Keyfactor Command Keyfactor API
                                                            This hostname must match the hostname entered for the Management Portal unless you are installing a secondary instance of the Keyfactor API A set of functions to allow creation of applications. Keyfactor offers the Keyfactor API, which allows third-party software to integrate with the advanced certificate enrollment and management features of Keyfactor Command..
 A set of functions to allow creation of applications. Keyfactor offers the Keyfactor API, which allows third-party software to integrate with the advanced certificate enrollment and management features of Keyfactor Command..
 Keyfactor Command Classic API
Keyfactor Command Classic API
                                                            This hostname is only required if you choose to enable this option for legacy support. Out of the box, the Keyfactor Command API PowerShell Client use the Classic API role. If all Keyfactor Command roles are combined on one server, this will be the same hostname as used for the Keyfactor Command Management Portal.
 Centralized Logging Solution
Centralized Logging Solution
                                                            This hostname is only required if you choose to enable the option to copy Keyfactor Command audit logs entries in real time, as they are generated, to a separate server for collection The certificate search function allows you to query the Keyfactor Command database for certificates from any available source based on any criteria of the certificates  and save the results as a collection that will be availble in other places in the Management Portal (e.g. expiration alerts and certain reports). and analysis by a centralized logging solution (e.g. rsyslog
 The certificate search function allows you to query the Keyfactor Command database for certificates from any available source based on any criteria of the certificates  and save the results as a collection that will be availble in other places in the Management Portal (e.g. expiration alerts and certain reports). and analysis by a centralized logging solution (e.g. rsyslog Rsyslog is an open-source software utility used on UNIX and Unix-like computer systems for forwarding log messages in an IP network., Logstash).
 Rsyslog is an open-source software utility used on UNIX and Unix-like computer systems for forwarding log messages in an IP network., Logstash).
Prior to beginning the Keyfactor Command installation, ensure that the selected hostnames resolve successfully.
