Validate the SHA-256 checksum

Before you begin

  • Verify that the ETP Client file is digitally signed by Akamai.
  • Make sure that the ETP super administrator provided the SHA-256 checksum value that is visible in ETP.

After the client file is downloaded, an IT administrator should validate the SHA-256 checksum. Depending on your operating system, use these instructions to compare the SHA-256 value provided in ETP with the value you get when completing this procedure for your operating system.

On Windows

How to

  1. Open a command prompt.
  2. Change directories to the location where the client file is located. For example, if the file is located in your Downloads folder, you can enter this command and press Enter:
    cd c:\users\<name>\downloads

    where <name> is the name of your user folder.

  3. Type the following command to generate the checksum value and press Enter:
    certutil -hashfile <filename> SHA256

    where <filename> is the name of the .msi file

  4. Verify that the returned checksum value matches the SHA-256 value in ETP. If the values do not match, contact the ETP administrator to download the client file again and repeat this procedure.

Next steps

The IT administrator tests ETP Client software in a testing environment. Make sure ETP Client is tested in an environment that contains the same network configuration, VPN, and security applications as production.

On Mac

How to

  1. Open a terminal window.
  2. Enter this command:
    shasum -a 256 <fileLocation>

    where <fileLocation> is the full path of the .pkg file on your computer.

    You can also drag and drop the file to the terminal window. The full path appears.

  3. Press Enter. The SHA-256 checksum appears.
  4. Verify that the returned checksum value matches the SHA-256 value in ETP. If the values do not match, contact the ETP administrator to download the client file again and repeat this procedure.

Next steps

The IT administrator tests ETP Client software in a testing environment. Make sure ETP Client is tested in an environment that contains the same network configuration, VPN, and security applications as production.