System provisioning
After the initial setup, system provisioning can be performed via SSH. This process includes creating a GUI/REST administrator account and generating a REST API authentication token (e.g., a JWT). An authentication token is required to access the REST API. Once the token has been created, the same deployment pipeline can continue provisioning the system through REST API calls, enabling seamless integration into fully automated deployment workflows.
Obtaining a REST API Token via CLI
- If not configured during installation, create an administrator account including password setting, role assignment and corresponding JWT creation:
- Notice
For unattended installations, we recommend omitting the
alinst.adminpw=kernel parameter to avoid plain-text secrets in PXE/TFTP. The command above sets the password only after the system is online and the channel is protected by SSH. - Retrieve the JWT for REST automation in JSON format for the admin user:
- Example output:
- Example
{ "admin": { "password": "enabled", "roles": "airlock-administrator", "token": "eyJlbmMiOiJBMjU2…DCN02PgU9fg1M", "tokenExpired": "false", "readPaths": ".*", "writePaths": ".*" } }
Obtaining a REST API Token via the GUI
For manual installations, an API key can also be created in the Configuration Center:
- Go to:
System Setup >> System Admin - In the API Keys section, create an API key.
Establishing REST API Access
Use the generated key as Bearer token in the Authorization header of all REST calls:
Access URL for Airlock Gateway: https://<airlock>:8443/
Note: REST API tokens are valid for up to 2 years.
With the token in place, the deployment pipeline (Ansible, GitLab CI, etc.) finishes post-installation tasks, e.g.:
- importing a baseline configuration
- creating tenant users and JWTs
- enabling maintenance mode on back-ends
Activating the configuration
For details on the activation process, refer to the Activate a configuration section of the REST API documentation.