PKI Server Configuration Guide-4.12
PKI Server Configuration Guide-4.12
12 Server
Configuration Guide
OpenTrust PKI 4.12 Server Configuration Guide
Release Date: 2019-04-25
This software package (“Product”), including its related documentation, is protected by copyright and may be protected
by patent.
Restricted Rights. The Product and its associated documentation are the exclusive property of IDnomic (trade name
of Keynectis SA) and its own licensors or other software vendors. They are intended to be used exclusively by holders
of a valid license to use the Product documented herein (hereinafter designated as "Licensee"). Licensee is granted a
personal, non-exclusive and non-assignable right to use the Product, in executable code form, in accordance with the
associated documentation, exclusively as defined in the usage conditions of the license agreement signed with IDnomic
or in the IDnomic General License Terms. Moreover, Licensee shall not remove or modify any trademark, copyright
or other intellectual proprietary rights notices of IDnomic or its licensors contained in the Product components and the
associated documentation.
Confidentiality. The Product and its associated documentation, including technical features, specifications, policies,
technical manuals (installation, operating, administration and use guides), training materials, instructions, requirements,
algorithms, computer programs, models and drawings provided or made available by IDnomic, contain valuable
and confidential information which is proprietary to IDnomic or its licensors and which constitutes trade secrets and
unpublished copyrighted material of IDnomic or its licensors (collectively designated as the "Proprietary Information").
Therefore, Licensee shall (i) not disclose, directly or indirectly, the Proprietary Information obtained from IDnomic to any
other person or entity, (ii) protect the Proprietary Information with at least the same degree of care and confidentiality as
it affords its own confidential information, at all times exercising at least a reasonable degree of care in such protection,
(iii) not print, to copy or reproduce, on any medium whatsoever, all or part of Proprietary Information without the prior
written consent of IDnomic and (iv) not publish, post or distribute all or part of Proprietary Information without the prior
written agreement of IDnomic. The Licensee acknowledges that IDnomic and its own licensors shall have the right to
take all reasonable steps to protect its Proprietary Information, including, but not limited to, injunctive relief and any
other remedies as may be available at law or in equity in the event that the Licensee does not fulfill its obligation of
confidentiality.
Warranty. IDNOMIC DOES NOT WARRANT THAT THE PRODUCT AND ITS ASSOCIATED DOCUMENTATION
ARE ERROR FREE. THEY ARE PROVIDED "AS IS" AND IDNOMIC DISCLAIMS ALL WARRANTIES AND
RERESENTATIONS OF ANY KIND WHATSOEVER, WHETHER EXPRESS OR IMPLIED, WITH RESPECT TO
THE PRODUCT AND ITS DOCUMENTATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF
MERCHANTABILITY, SATISFACTORY QUALITY OR FITNESS FOR A PARTICULAR PURPOSE, WARRANTIES
ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE. FURTHERMORE, IDNOMIC DOES NOT
WARRANT OR MAKE ANY REPRESENTATIONS REGARDING THE USE OR THE RESULTS OF THE USE OF THE
PRODUCT OR RELATED DOCUMENTATION IN TERMS OF THEIR CORRECTNESS, ACCURACY, RELIABILITY OR
OTHERWISE.
Limited Liability. IDnomic shall not be liable for any direct, indirect, consequential, incidental or other damages, either
in contract or tort, whatsoever, arising from or connected with the usage of the documentation even if IDnomic has been
advised of the possibility of such damages.
Changes. Any information contained in the documentation can be amended and modified by IDnomic at any time and
without notice.
Trademarks. IDnomic® is a trademark of Keynectis SA registered in France, in the European Union, in the United
States and other countries.
All other brands, company name or product names contained in the Product and/or in the associated documentation may
be registered as trademarks or trade names of their respective owners.
Contents
Preface ................................................................................................................................................. v
1. Related IDnomic Documentation ............................................................................................................................................... v
1.1. Related OpenTrust PKI Documentation .............................................................................................................................................................................. v
2. Resources ................................................................................................................................................................................... v
2.1. Contact Customer Service .................................................................................................................................................................................................. v
2.2. Provide Documentation Feedback ...................................................................................................................................................................................... v
3. Document Conventions ............................................................................................................................................................. vi
Chapter 1. Manage CAs ......................................................................................................................... 7
1.1. Manage Internal CAs .............................................................................................................................................................. 7
1.1.1. Create an Internal CA ...................................................................................................................................................................................................... 7
1.1.1.1. Begin Internal CA Creation ............................................................................................................................................................................. 7
1.1.1.2. Choose Internal CA Certificate Signing Method ............................................................................................................................................. 8
1.1.1.3. Complete Internal CA Creation ..................................................................................................................................................................... 11
1.1.2. View Internal CAs ........................................................................................................................................................................................................... 13
1.1.3. Edit an Internal CA ......................................................................................................................................................................................................... 13
1.1.4. Delete a Pending Internal CA ........................................................................................................................................................................................ 14
1.1.5. View and Issue CRLs for Internal CAs ......................................................................................................................................................................... 15
1.1.6. Manage Internal CA Certificates .................................................................................................................................................................................... 15
1.1.6.1. Renew CA Certificates .................................................................................................................................................................................. 15
1.1.6.2. Re-sign CA Certificates ................................................................................................................................................................................. 15
1.1.6.3. Revoke CA Certificates ................................................................................................................................................................................. 16
1.2. Manage External CA Configurations .................................................................................................................................... 16
1.2.1. Trust/Register an External CA ....................................................................................................................................................................................... 17
1.2.2. Use Registered External CA Configurations ................................................................................................................................................................. 18
1.2.3. Obtain Registered External CA Configurations from the OpenTrust PKI CA Component ............................................................................................ 19
1.3. Synchronize CA Configurations ............................................................................................................................................ 19
Chapter 2. Configure Certificate Management Profiles ............................................................................ 21
2.1. Configure Standard Directory Components ......................................................................................................................... 21
2.1.1. Configure an LDAP Directory Connection ..................................................................................................................................................................... 21
2.1.2. Configure/Add a Datasource .......................................................................................................................................................................................... 23
2.1.2.1. Understand Datasources ............................................................................................................................................................................... 23
2.1.2.2. Configure a Datasource ................................................................................................................................................................................ 23
2.1.3. Configure an Authentication Scheme ............................................................................................................................................................................ 24
2.2. Configure Optional Certificate Management Profile Components ....................................................................................... 25
2.2.1. Configure a Password Policy ......................................................................................................................................................................................... 25
2.2.2. Configure Browser Usage .............................................................................................................................................................................................. 26
2.2.3. Configure Metadata Types ............................................................................................................................................................................................. 29
2.2.4. Configure Holder Match Settings ................................................................................................................................................................................... 30
2.2.5. Enable Publication of Certificates and CRLs to Directories .......................................................................................................................................... 32
2.2.6. Configure SCEP Policies ............................................................................................................................................................................................... 34
2.2.7. Configure Automatic Emails ........................................................................................................................................................................................... 35
2.2.8. Create Certificate Categories ......................................................................................................................................................................................... 37
2.3. Create a Certificate Management Profile ............................................................................................................................. 37
2.3.1. Configure the General Settings ..................................................................................................................................................................................... 38
2.3.2. Configure an Enrollment Method ................................................................................................................................................................................... 39
2.3.3. Configure Additional Enrollment Options ....................................................................................................................................................................... 44
2.3.4. Configure Renewal Options ........................................................................................................................................................................................... 47
2.3.5. Configure Key Pair Recovery Options ........................................................................................................................................................................... 48
2.3.6. Configure Revocation Options ....................................................................................................................................................................................... 49
2.3.7. Configure Certificate Extension Requirements .............................................................................................................................................................. 50
2.3.8. Configure Subject DN Components ............................................................................................................................................................................... 52
2.4. Import or Export Certificate Management Profile Component Configurations ..................................................................... 53
2.4.1. Export Certificate Management Profile Component Configurations .............................................................................................................................. 54
2.4.2. Import Certificate Management Profile Component Configurations .............................................................................................................................. 54
• “Resources” on page v
• Release Notes - The release notes provide a summary of the new features and changes to existing features
between the previous and most recent versions of OpenTrust PKI. The release notes also contain a list of resolved
issues and known issues, and any late-breaking information that is important to know but is not included in other
documentation.
• Server Installation and Upgrade Guide - This guide provides a comprehensive set of instructions for installing or
upgrading to the latest version of the OpenTrust PKI.
• System Maintenance Guide - This guide should be used by the administrators responsible for maintaining the
OpenTrust PKI host environment and performing system maintenance such monitoring application services,
performing backup and recovery procedures, and evaluating log files.
• Lifecycle Administrator Guide - This guide is intended for administrators who manage the certificate lifecycle by
creating and issuing certificates, and performing recovery and revocation procedures. This guide also contains the
instructions lifecycle administrators can give to certificate holders who need to participate in the administration of
their certificates.
• SOAP Developer Guide - This guide is a reference tool for the SOAP Connectors Application Programming
Interface, which allows external applications - such as OpenTrust CMS, Identity & Access Management (IAM)
platforms, customer care and support applications, and reporting tools - to interact with OpenTrust PKI.
• Audit Logs Guide - This guide is for administrators, software consultants, or developers who need to understand
the OpenTrust PKI audit log system. It contains a general overview of the OpenTrust PKI audit log concepts and
architecture, detailed descriptions of audit events and alerts recorded by the OpenTrust PKI, the structure of the
audit log SQL database for developers or software architects planning to use the log module's SQL database for
reporting purposes, sample log event message XML, and sample syslog output.
2. Resources
Please use the information provided to contact the appropriate IDnomic department or representative.
3. Document Conventions
IDnomic documentation uses typographical conventions with specific meanings. These conventions are described in the
following table.
1. Log in to the user interface for the OpenTrust PKI CA component as an administrator with the Access right.
If the initial administration certificate has not yet been deleted, an administrator using the initial administration
certificate can also perform this task.
3. On the CA Creation page, in the CA Identifier field, enter a name for the CA.
4. Click OK.
• RSA Software
• DSA Software that was installed as described in the "Install the ECDSA Package" section of the OpenTrust
PKI Server Installation and Upgrade Guide.
• ECDSA Software that was installed as described in the "Install the ECDSA Package" section of the OpenTrust
PKI Server Installation and Upgrade Guide.
• the Hardware Security Module (HSM) that was installed on the host server for the CA component of the
OpenTrust PKI, as described in the "Integrate with a Hardware Security Module" section of the OpenTrust PKI
Server Installation and Upgrade Guide.
If an HSM was not installed on the host server for the CA component of the OpenTrust PKI, only software options
will be available for the Key Type. If an ECDSA package was not installed on all servers hosting OpenTrust PKI
components, the ECDSA option will not be available for the Key Type. If neither an ECDSA package nor an HSM
were installed, unless using a legacy environment that requires DSA Software, administrators using software
keys should choose RSA Software.
6. Complete the additional configuration fields that correspond to the Key Type selected:
• Key Size - If RSA or DSA was selected as the Key Type, choose an encryption level for the CA's private key.
Selecting a larger key size will result in a more secure CA. It may take a longer time to generate larger, more
secure keys and to sign certificates with this CA.
• Curve - If ECDSA Software was selected as the Key Type, choose a supported ECDSA curve to be used to
sign the private key for the CA being created. This drop-down menu is only displayed when ECDSA Software
is selected as the Key Type.
• Additional Hardware Security Module Configuration Fields - If an HSM was selected as the Key Type,
complete any additional configuration fields for the HSM in consultation with an assigned IDnomic technical
representative.
7. Click OK.
8. On the Choose DN and Signature Parameters page, select the DN components to be included in the DN of the
certificate created for the CA and in the Issuer DN of all certificates created by the CA. Use the plus and minus
signs to add and remove DN components from the list. Use the up and down arrows to determine the order in
which the DN components will be included in the DN of the certificate created for the CA and in the Issuer DN of
all certificates created by the CA.
To use the Organization Identifier as a subject DN component, the add-on eIDAS .rpm must be applied. Contact
an assigned IDnomic technical representative for more information.
10. Choose to leave UTF8 encoding enabled or to Disable UTF8 Encoding. Most implementations will benefit
from UTF8 encoding and this option should not be selected without consulting an assigned IDnomic technical
representative.
1. All CAs are required to have an identifying certificate. As part of the certificate creation process, certificates must
obtain a signature from a CA. The application creating the certificate uses a certificate signing request (CSR) to
obtain the signature for a certificate. The CA-provided signature allows the certificate to be recognized as valid.
On the Certificate Signing Parameters page, choose how the CSR for the certificate being generated for the
OpenTrust PKI CA will be signed:
• Signed by an External CA - If the CA being created will use a CA external to the OpenTrust PKI as a the
signing CA for the OpenTrust PKI and the CA being created will need to request a certificate signature from
the external signing CA, select this option.
• Self-signed - If the CA being created will be a root CA for the OpenTrust PKI, select this option to enable the
CA being created to sign its own certificate signing request.
• Signed by a Local CA - If the CA being created will request its certificate signature from a CA that has
already been created using the OpenTrust PKI, select this option. This option will only be available if a CA has
already been created for the OpenTrust PKI.
2. Click OK and continue to the section that corresponds to the selected certificate signing method:
or
1. If "self-signed" or "signed by a local CA" was not selected as the signature method, continue to Step
1 on page 10. If "self-signed" or "signed by a local CA" was selected as the signature method for the CSR of
the certificate for the CA being created, on the Self-signature page or the Issuer CA Choice page, configure the
required certificate information for the CA certificate:
a. List CAs - If "signed by a local CA" was selected as the signature method for the CSR of the certificate
for the CA being created, select the local CA to use to sign the certificate for the CA being created. If "self-
signed" was selected as the signature method for the CSR of the certificate for the CA being created, skip
this step.
b. Validity (In Days or YYYY-MM-DD) - Enter the number of days the certificate will be valid or enter an
expiration date for the certificate.
c. Hash Function - Select a supported hash function to use to sign the certificate for the CA being created.
For help selecting the hash function most appropriate for the CA being created, contact an assigned
IDnomic technical representative.
d. Randomly Chosen CA Serial Number - If "self-signed" was selected as the signature method, select this
option to attribute a random serial number to the self-signed CA certificate.
• CA Serial Number Prefix - Only displays if the previous option is selected. A prefix may be added to the
random serial number of the self-signed CA certificate. The prefix can either be the hash of the CA's DN,
or a custom string of characters. To use a custom prefix, fill in the corresponding field.
Note: The Custom Prefix field may only contain the following characters: 0123456789abcdef. It
can contain 8 characters maximum.
• Key Identifiers:
◦ Subject Key Identifier - Subject key identifiers are used to identify certificates that contain a common public
key used by an application. Subject key identifiers are added to certificates through certificate extensions.
To include a non-critical subject-key-identifier certificate extension in the certificate being created for the CA,
select the "Include a Subject Key Identifier in certificates created with this certificate management profile"
option. To create the certificate without a subject-key-identifier certificate extension, de-select the "Include a
Subject Key Identifier in certificates created with this certificate management profile" option.
◦ Authority Key Identifier - Authority key identifiers are used to identify the public key that corresponds to
the private key used to sign a certificate. Authority key identifiers are added to certificates through certificate
extensions. To include a non-critical authority-key-identifier certificate extension in the certificate being
created for the CA, select Signing CA's SKI, which will generate a unique authority key identifier for the
signing CA's public key. Use of the Signing CA's SKI option is strongly recommended for all certificates.
Administrators can select Signing CA's Serial Number and Issuer DN to add the Signing CA's Serial Number
and Issuer DN to the authority key identifier. To prevent future interoperability issues, use of the Signing CA's
Serial Number and Issuer DN option is not recommended. To create the certificate without an authority-key-
identifier certificate extension, de-select the Signing CA's SKI and Signing CA's Serial Number and Issuer
DN options.
• Basic Constraints - Basic constraints are used to identify whether the subject of a certificate is a CA and
to specify the maximum number of non-self-issued intermediate CA certificates that may follow a certificate
in valid certification paths. Basic constraints are added to certificates through certificate extensions. The
certificate being created will automatically be identified as being for a CA. To specify the maximum number
of non-self-issued intermediate CA certificates that may follow the CA certificate being created, in valid
certification paths, select a Certification Path Length.
• CRL Distribution Point - CRL distribution points are locations from which CRLs can be obtained. To include
a CRL distribution point in the certificate being created for the CA, enter a URI from which the CRL of the CA
signing the certificate can be downloaded. The option to use this extension will not be available if self-signed
was selected as the signature method for the CSR of the certificate for the CA being created.
• Authority Information Access - Authority information access extensions contain information about how
to access information and services, such as online validation services and CA certificates, for the CA that
creates the certificate in which the extension appears. The option to use this extension will not be available if
self-signed was selected as the signature method for the CSR of the certificate for the CA being created. To
include an authority information access extension in the certificate for the CA being created, select the method
to use to access the authority information:
◦ OCSP Service - Select this option when revocation information for the certificate in which this extension will
be included can be obtained using an OCSP responder integrated with the OpenTrust PKI. If this option is
selected, for the address, enter the URI of the OCSP service for the OCSP responder. To include more than
one URI for an OCSP service in the extension, click Add More and select the OCSP service option again.
◦ Authority Certificate - Select this option to include a URI from which to obtain the certificate of the CA
being used to sign the certificate in which the extension will be included. The certificate for the CA being
used to sign the certificate can be used to help certificate users select a certification path that terminates at
a point trusted by the certificate user. If this option is selected, for the address, enter the URI from which the
CA certificate can be obtained in the form of a DER file. To include multiple CA certificate addresses in the
authority information access extension, when the CA certificate can be obtained from more than one URI,
click Add More and select the authority certificate option again.
• Certificate Policies - Certificate policies extensions contain information about the policy used to create a
certificate. Certificate policy extensions are comprised of one or more policy information terms, each of which
consists of an object identifier (OID) and optional qualifiers. In a CA certificate, policy information terms limit
the set of policies for certification paths that include the certificate. In an end entity certificate, these policy
information terms indicate the policy under which the certificate has been issued and the purposes for which
the certificate may be used. To add a certificate policy extension to the certificate being created for the CA,
enter any meaningful value for the Policy Identifier OID. The OpenTrust PKI supports the Struct and Address
qualifiers for certificate policies extensions. If a supported qualifier should also be added to the certificate
extension, choose a qualifier and configure the options for the qualifier:
◦ Address - To include, in the certificate being created for the CA, the URI of a Certification Practice
Statement (CPS) published by the signing CA, select Address and enter the URI from which the CPS can be
downloaded.
◦ Struct - To include general information about the certificate policy being used to create the CA certificate,
enter information in any of the optional fields:
▫ Organization - Enter the name of the organization that created the certificate policy. If this option is
configured, Notice Numbers must also be configured.
▫ Notice Numbers - Enter a number associated with the certificate policy. To enter more than one number
associated with the policy, separate the numbers with commas. If this option is configured, Organization
must also be configured.
1. If "signed by an external CA" was selected as the signature method for the CSR of the certificate for the CA
being created, on the Download File/Upload File page, click the Download Link and Save the .csr file.
2. Leave the user interface of the OpenTrust PKI CA component on which the CA is being created, log in to user
interface of the external PKI as an administrator with CSR signing rights, and use the downloaded .csr file to
obtain a signed certificate for the CA being created. It is possible to use the Offline CA product as the external
signing CA.
3. Once the signature request has been signed and a signed certificate file is available for the CA being
created, return to the user interface of OpenTrust PKI CA component on which the CA is being created as an
administrator with the Configuration right for the CA component and navigate to the Certificate Authority | CA
Management | List CAs page.
4. On the List CAs page, in the "List of Certificate Authorities being created." area, in the row that corresponds to
the CA for which the signed certificate was obtained, in the Actions column, click Add This CA.
6. Click OK.
7. On the Download File/Upload File page, select a method to access the file containing the signed certificate for
the CA being created, encoded in PEM, DER, or PKCS#7 format and thus typically using a .pem, .der, or .p7b
extension. It is possible for the file containing the certificate, encoded in PEM, DER, or PKCS#7 format, to use an
alternate file extension, such as .crt.
• Local Path - If the file containing the new CA's certificate has been copied to a directory on the machine
where the browser being used to access the user interface for the OpenTrust PKI CA component is installed or
is located on a USB key connected to the machine where the browser being used to access the user interface
for the OpenTrust PKI CA component is installed, enter or browse to and select the directory path and file
name of the file containing the new CA's certificate.
• URL - If the file containing the new CA's certificate is accessible from a server location,
enter the fully-qualified domain name, file path, and file name in the form of a URL such as
https://fqdnofserverhostingcacertificate/certs/CAcertificate.p7b.
9. On the File Hash Details page, review the file hash details and the details of the certificate being imported for the
new CA, and then click Import.
10. Leave the user interface for the OpenTrust PKI CA component to obtain the certificate and CRL location for
the external signing CA.
11. To register and trust the CA that signed the certificate for the newly created CA, return to the user interface for
the OpenTrust PKI CA component with the certificate and CRL location for the signing CA and complete the
instructions in “Trust/Register an External CA” on page 17.
1. On the CA Configuration page, accept or modify the default values for the CA:
• CRL Name - Enter a name for the CA's Certificate Revocation List, appended by .crl. The default CRL
name is the CN of the CA's certificate DN. The CRL's name is used to make the CRL file available via HTTP
on all of the servers hosting OpenTrust PKI components. For example, if the fully-qualified domain name of
the server hosting the OpenTrust PKI EE component is pkiee, the CRL will be available for download at
http://pkiee.com/crl_name.crl.
• Certificates Default Validity Duration - Certificates created by the CA will be valid for the period of time
entered unless the certificate management profile the CA uses to create the certificate specifies a different
validity duration.
• CRL Validity Duration - The CRL issued by the CA will be valid for the period of time entered. IDnomic
recommends that the entered validity period be at least two days so that in case of a server failure, the CRL
will not become invalid while the server is being restored and the CRL cannot be automatically updated.
The CRL is automatically updated every day and after each certificate revocation while the server is
operating correctly unless an administrator disables the CRL update functionality when editing the advanced
configuration options for an internal CA, as described in Step 5 on page 14.
• Hash Function - Select the hash algorithm to use to sign certificates and CRLs created by the CA.
• Backdate Certificates (Seconds) - If the validity start time for certificates created by the CA should be
backdated, enter the number of seconds by which to backdate the certificates created by the CA. This option
can be used to ensure the validity of a certificate when the certificate needs to registered or enrolled on
another server whose clock time may not exactly match the time set on the OpenTrust PKI server clock, such
as in the case of enrolling a Blackberry user's certificate on a BES server.
• Set the Microsoft "crlNextPublish" CRL extension - Select this option to enable the Microsoft
"crlNextPublish" CRL extension. This non-critical CRL extension indicates the date and time when the CA will
publish a new CRL.
• Set the "expiredCertsOnCRL" CRL extension - Select this option to enable the "expiredCertsOnCRL"
CRL entry extension. This non-critical CRL entry extension can be used to list all revoked certificates, both
unexpired and expired since the CA creation date.
• Issue Certificates with Randomly Chosen Serial Number - If this option is selected, the certificates issued
by the CA will have random serial numbers instead of sequential serial numbers.
Important: Once a CA has been configured to issue certificates with random serial numbers, it is
impossible to re-configure it to issue certificates with sequential serial numbers.
◦ Certificates Serial Numbers Prefix - Only displays if the previous option is selected. A prefix may be
added to the random serial numbers of the certificates issued by the CA. The prefix can either be the hash
of the CA's DN, or a custom string of characters. To use a custom prefix, fill in the corresponding field.
Note: The Custom Prefix field may only contain the following characters: 0123456789abcdef. It can
contain 8 characters maximum.
• Set as Default CA - Select this option to make the CA being created the default CA for the OpenTrust PKI.
The default CA is selected by default in the default certificate profiles and is the CA selected by default when
selecting a CA to use to renew and sign internal certificates and to sign the initial administrator .p12 file
for the PKI. This option will only be available if a CA has already been created for the OpenTrust PKI or an
external CA has been trusted by the OpenTrust PKI.
• Generate an Exchange Certificate - Select this option to allow key archival with the Auto-Enrollment Proxy
for the CA.
Important: For key archival with the Auto-Enrollment Proxy to be effective, the corresponding
option must be selected in the properties of the associated Windows Certificate Template (see the
"Certificate Template Options" section of the AEP Server Configuration Guide). This feature requires
Auto-Enrollment Proxy version 2.3 or higher.
2. Click Save.
3. If the "Generate an Exchange Certificate" option was not selected, skip this step and continue to Step
4 on page 12. If the option was selected, configure the properties of the exchange certificate:
a. Select the AEP compatible option. This option fills in the parameters that are required to make the
exchange certificate compatible with the Auto-Enrollment Proxy.
d. Click OK.
4. View the "The Certificate Authority has been successfully created." success message.
5. After the success message is displayed, restart the httpd service on the server hosting the OpenTrust PKI
CA component and restart the ocsp service on the server hosting the OpenTrust PKI RA component. These
services can be restarted using the instructions found in the "Restart Services" section of the OpenTrust PKI
Server Configuration Guide .
6. To configure additional options for a newly created internal CA, follow the instructions in “Edit an Internal
CA” on page 13.
7. To add additional CAs to the OpenTrust PKI, return to Step 2 on page 7 and repeat the procedures. In
environments where the OpenTrust PKI CA component is not hosted on the same server as the OpenTrust PKI
RA, EE, or Logs components, to make a newly created CA available to the OpenTrust PKI RA, EE, or Logs
components, continue to “Synchronize CA Configurations” on page 19.
To view the list of CAs or the configuration details for a particular CA:
1. Log in to the user interface for the OpenTrust PKI CA component as an administrator with the Access right.
If the initial administration certificate has not yet been deleted, an administrator using the initial administration
certificate can also perform this task.
3. On the List CAs page, view the summary details for existing CAs and CAs in progress.
4. To view more details for a fully-configured internal CA, in the Actions column for the CA, select one of the
following options:
• View Certificate Details - displays the CA's certificate in PEM format and more detailed information about to
the CA's certificate than is displayed in the summary information on the List CAs page
• Exchange Certificate Details - displays the CA's exchange certificate in PEM format and additional
information about the exchange certificate. This option is only available for CAs that have an exchange
certificate.
• View CRL Details - displays the CA's CRL in PEM format and detailed information about the CRL
• Configure - displays detailed information about the CA configuration, including the trusted or untrusted status
of the CA
1. Log in to the user interface for the OpenTrust PKI CA component as an administrator with the Access right.
If the initial administration certificate has not yet been deleted, an administrator using the initial administration
certificate can also perform this task.
3. On the List CAs page, in the Actions column for the CA, select Configure.
4. On the Configuration Options page, make changes to any of the following configuration options:
• CRL Name - Enter a name for the CA's Certificate Revocation List, appended by .crl. The default CRL name
is the CN of the CA's certificate DN.
• Certificates Default Validity Duration - Certificates created by the CA will be valid for the period of time
entered unless the certificate management profile the CA uses to create the certificate specifies a different
validity duration.
• CRL Validity Duration - The CRL issued by the CA will be valid for the period of time entered. IDnomic
recommends that the entered validity period be at least two days so that in case of a server failure, the CRL
will not become invalid while the server is being restored. The CRL is automatically updated every day and
after each certificate revocation while the server is operating correctly unless an administrator disables the
CRL update functionality when editing the advanced configuration options for an internal CA, as described in
Step 5 on page 14.
• Hash Function - Select the hash algorithm to use to sign certificates and CRLs created by the CA.
• Backdate Certificates (Seconds) - If the validity start time for certificates created by the CA should be
backdated, enter the number of seconds by which to backdate the certificates created by the CA. This option
can be used to ensure the validity of a certificate when the certificate needs to be registered or enrolled on
another server whose clock time may not exactly match the time set on the OpenTrust PKI server clock, such
as in the case of enrolling a Blackberry user's certificate on a BES server.
• Set the Microsoft "crlNextPublish" CRL extension - Select this option to enable the Microsoft
"crlNextPublish" CRL extension. This non-critical CRL extension indicates the date and time when the CA will
publish a new CRL.
• Issue Certificates with Randomly Chosen Serial Number - If this option is selected, the certificates issued
by the CA will have random serial numbers instead of sequential serial numbers.
Important: Once a CA has been configured to issue certificates with random serial numbers, it is
impossible to re-configure it to issue certificates with sequential serial numbers.
◦ Certificates Serial Numbers Prefix - Only displays if the previous option is selected. A prefix may be
added to the random serial numbers of the certificates issued by the CA. The prefix can either be the hash
of the CA's DN, or a custom string of characters. To use a custom prefix, fill in the corresponding field.
Note: The Custom Prefix field may only contain the following characters: 0123456789abcdef. It can
contain 8 characters maximum.
• Set as Default CA - Select this option to make the CA the default CA for the OpenTrust PKI. The default CA
is selected by default in the default certificate profiles and is the CA selected by default when selecting a CA to
use to renew and sign internal certificates and to sign the initial administrator .p12 file for the OpenTrust PKI.
• Regenerate an Exchange Certificate - Select this option to revoke the previous exchange certificate and
generate a new one.
5. On the Configuration Options page, administrators may also configure any of the following advanced options:
• Trust this Authority - Trust or untrust the CA. Trusted CAs can be used to verify the certification path of a
user's certificate, which ensures the validity of the certificates used to log in to the OpenTrust PKI.
• Disable Periodic CRL Generation - Disables or enables the daily automatic updates of the CRL.
• Disable CRL Generation on Revocation - Disables or enables the automatic CRL update that occurs every
time a certificate issued by the CA is revoked.
7. If the "Regenerate an Exchange Certificate" option was selected, configure the properties of the exchange
certificate:
a. Select the AEP compatible option. This option fills in the parameters that are required to make the
exchange certificate compatible with the Auto-Enrollment Proxy.
d. Click OK.
1. Log in to the user interface for the OpenTrust PKI CA component as an administrator with the Access right.
If the initial administration certificate has not yet been deleted, an administrator using the initial administration
certificate can also perform this task.
3. On the List CAs page, in the Actions column for the CA, click Remove.
5. To verify that the pending CA was deleted, view the updated list of CAs.
1. Log in to the user interface for an OpenTrust PKI CA component as an administrator with the Access right. If
the initial administration certificate has not yet been deleted, an administrator using the initial administration
certificate can also perform this task.
3. On the Manage CRL page, in the CRL drop-down menu, select the CA that maintains the CRL to be viewed or
updated.
4. To view the CRL details or update the CRL associated with the selected CA, click one of the following buttons:
• Display - displays the selected CA's CRL in PEM format and detailed information about the CRL
1. Log in to the user interface for an OpenTrust PKI CA component as an administrator with the Access right. If
the initial administration certificate has not yet been deleted, an administrator using the initial administration
certificate can also perform this task.
3. On the List CAs page, in the Actions column for the CA, select Renew.
4. On the Renew the Certification Authority page, click Renew the Certification Authority. This option will only be
available if the certificate for the internal CA has a status of Not Revoked.
5. View the "Here is the new Certification Authority certificate." success message.
1. Log in to the user interface for an OpenTrust PKI CA component as an administrator with the Access right. If
the initial administration certificate has not yet been deleted, an administrator using the initial administration
certificate can also perform this task.
3. On the List CAs page, in the Actions column for the CA, select Renew.
4. On the Renew the Certificate Authority page, click Re-sign the Certification Authority.
5. The remainder of the certificate re-signing process is the same as the process used to sign the original certificate
for the internal CA. Follow the instructions used to create an internal CA, starting with Step 1 on page 8.
Note: The httpd and ocsp services do not need to be restarted when re-signing internal certificates.
1. Log in to the user interface for an OpenTrust PKI CA component as an administrator with the Access right. If
the initial administration certificate has not yet been deleted, an administrator using the initial administration
certificate can also perform this task.
3. On the List CAs page, in the Actions column for the CA, select Revoke.
4. On the Revoke a CA page, in the Reason drop-down menu, select a reason for the revocation.
5. In the Comment text box, to record any pertinent information related to the revocation, enter free-form
comments.
6. Click OK.
7. View the "The Certificate Authority has been successfully revoked." success message.
8. For all certificate management profiles that used the CA whose certificate was revoked, change the selected
CA or disable the certificate management profiles to prevent enrollment issues. All certificate holders whose
certificates were generated by a revoked CA must request a new certificate, as certificates signed by a revoked
CA will be considered invalid and cannot be used to authenticate to the OpenTrust PKI.
In an extreme example of how the certification path validity can be applied, if the external CA that signed the certificate
for a unique internal CA of an OpenTrust PKI revokes the internal OpenTrust PKI CA's certificate, the internal OpenTrust
PKI CA's certificate would be in the external signing CA's CRL, making all certificates that were signed by the internal CA
with the now revoked certificate invalid, so the holders of these certificates would be unable to connect to the OpenTrust
PKI.
External CAs can also be used to authenticate certificate holders to the OpenTrust PKI, but holders of certificates issued
by external CAs cannot be assigned rights within the OpenTrust PKI without a customized OpenTrust PKI extension.
Contact an assigned IDnomic technical representative for more information about customized extensions.
• “Obtain Registered External CA Configurations from the OpenTrust PKI CA Component” on page 19
1. Log in to the user interface for the OpenTrust PKI CA, RA, EE, or Logs component on which the external CA will
be trusted as an administrator with the Server Management right. If the initial administration certificate has not
yet been deleted, an administrator using the initial administration certificate can also perform this task.
2. Navigate to the Server Management | Trust & Internal Certificates | Trusted External CAs page.
3. On the Trust Management page, to begin the process of trusting an external CA, click Trust an External CA.
4. On the Upload File page, select a method to access the file containing the certificate for the external CA,
encoded in PEM or DER format and thus typically using a .pem or .der extension. It is possible for the file
containing the certificate, encoded in PEM or DER format, to use an alternate file extension, such as .crt.
• Local Path - If the file containing the external CA's certificate has been copied to a directory on the machine
where the browser being used to perform these steps is installed, enter or browse to and select the directory
path and file name of the file containing the external CA's certificate.
• URL - If the file containing the external CA's certificate is accessible from a server location,
enter the fully-qualified domain name, file path, and file name in the form of a URL such as
https://fqdnofserverhostingcacertificate/certs/CAcertificate.der.
6. On the File Hash Details page, review the file hash details, the details of the external CA certificate being
imported, confirm that the CA identifier displayed is the CA identifier of the external CA, and click Add this CA.
7. View the "Certificate Authority has been successfully added to the list of trusted CAs." success message and, in
the "Please restart httpd service to take the modifications into account." message, click restart.
8. On the Restart page, follow the instructions in the "Restart Services" section of the OpenTrust PKI Server
Configuration Guide , selecting httpd as the service to restart.
9. To add a CRL to the newly trusted CA, navigate to the Server Management | Trust & Internal Certificates |
Trusted External CAs page.
10. On the Trust an External CA page, select the newly trusted external CA.
11. On the Trust Management page, in the CRL area, click Add.
12. In the CRL Name field, verify that the CRL name is correct.
1. In the Download URL field, enter the URL from which the trusted external CA's CRL can be downloaded.
4. Click Save.
2. On the Upload File pop-up, select a method to access the file containing the CRL for the external CA,
encoded in PEM or DER format and thus typically using a .pem or .der extension. It is possible for the file
containing the CRL for the external CA, encoded in PEM or DER format, to use an alternate file extension,
such as .crt.
◦ Local Path - If the file containing the external CA's CRL has been copied to a directory on the machine
where the browser being used to perform these steps is installed, enter or browse to and select the
directory path and file name of the file containing the external CA's CRL.
◦ URL - If the file containing the external CA's CRL is accessible from a server location,
enter the fully-qualified domain name, file path, and file name in the form of a URL such as
https://fqdnofserverhostingcacertificate/certs/CAcertificate.pem.
4. On the CRL Details pop-up, verify that the displayed information is correct and click OK.
Note: Changes made to registered external CA configurations are applied to the registered external CA
configuration on the host server for the OpenTrust PKI component on which the changes are made. If the
registered external CA configuration has been synched to other OpenTrust PKI components, the configurations
on the other OpenTrust PKI components for the same registered external CA will remain unchanged unless the
same changes are manually applied on the other OpenTrust PKI components.
1. Log in to the user interface for an OpenTrust PKI component that contains a registered external CA configuration
as an administrator with the Server Management right. If the initial administration certificate has not yet been
deleted, an administrator using the initial administration certificate can also perform this task.
2. Navigate to the Server Management | Trust & Internal Certificates | Trusted External CAs page.
4. On the Certificate and CRL page for the CA, use any of the available functionality:
• To trust or untrust the external CA, select or deselect the Trust this Authority checkbox.
• To update the CRL name for the external CA, in the CRL Name row of the CRL table, edit the CRL name.
• To update the CRL location for the external CA, in the Download URL field of the CRL table, follow the
instructions in Step 13 on page 17.
• To download the certificate for the external CA, click "Download this Certificate."
• To download the CRL for the external CA, click "Download this CRL."
• To display the last 20 certificates revoked by the external CA, click "Show the last 20 revoked certificates."
In multi-host server environments, registered external CA configurations can only be accessed on the same server as
the OpenTrust PKI component that trusted the external CA during the registration process described in “Trust/Register
an External CA” on page 17 unless the external CA was registered on the server hosting the OpenTrust PKI CA
component and a server hosting OpenTrust PKI RA, EE, or Logs components is synchronized with the OpenTrust PKI
CA. Once synchronized from the CA component to a non-CA component, an internal CA whose certificate was signed by
a registered and trusted external CA can authenticate certificate holders on the non-CA component.
To synchronize the CA configurations on a non-CA OpenTrust PKI component with the CA configurations on
the CA component:
1. Log in to the user interface for the OpenTrust PKI RA, EE, or Logs components as an administrator with the
Server Management right. If the initial administration certificate has not yet been deleted, an administrator using
the initial administration certificate can also perform this task.
2. Navigate to the Server Management | Trust & Internal Certificates | CA Synchronization page.
4. When the success message is displayed, restart the httpd service on the server on which the synchronization
was performed and restart the ocsp service on the server hosting the OpenTrust PKI RA component. These
services can be restarted using the instructions found in the "Restart Services" section of the OpenTrust PKI
Server Configuration Guide.
5. To verify that registered external CA configurations have been synchronized, in the user interface for the
OpenTrust PKI component to which the CA was synchronized, navigate to Server Management | Trust & Internal
Certificates | Trusted External CAs and view the list of registered external CAs. There is not a centralized user
interface location available to verify that internal CA configurations have been synchronized to OpenTrust
PKI RA, EE, and Logs components, but once synched, the internal CAs will be available for selection when
configuring Settings | Certificates | Certificate Management Profiles on the user interface for the server hosting
the RA component and in the user interface areas for certificate lifecycle administrators authenticated to the RA
and EE components.
Note: If configuration changes are made to a CA after it has been synched to other OpenTrust PKI components
and the changes need to be applied to the CA configuration on separately hosted OpenTrust PKI components,
the changes must be applied on the separately hosted components using the instructions in “Edit an Internal
CA” on page 13 for internal CAs and “Use Registered External CA Configurations” on page 18 for
registered external CAs.
1. Log in to the user interface for the RA component of the OpenTrust PKI as an administrator with the Profiles
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. On the Directories page, choose to Create a New Directory Connection or to Modify, Copy, or Remove an
existing LDAP directory connection.
4. If the choice is to create a new LDAP directory connection or modify or copy an existing LDAP directory
connection, on the Edit an LDAP Directory page, configure the following LDAP directory connection options:
a. Name - Enter a name and description for the LDAP directory connection. The name and description will be
visible in other parts of the user interface, for example, when selecting which LDAP directory to use for a
particular datasource. Providing detailed information in the name field will make it easier to select the correct
LDAP directory in other parts of the user interface.
b. Connection Type - Select the security protocol to use when the RA or EE component of the OpenTrust PKI
connects to the LDAP directory:
• SSL - The Secure Sockets Layer protocol is used to secure the connection between the RA or EE
component of the OpenTrust PKI and the LDAP directory.
• TLS - The Transport Layer Security protocol is used to secure the connection between the RA or EE
component of the OpenTrust PKI and the LDAP directory and prevents eavesdropping, tampering, and
message forgery using RSA encryption.
c. Host - Enter the fully-qualified domain name of the machine hosting the LDAP directory.
d. Port - Enter the port number on the server hosting the LDAP directory that the RA component of the
OpenTrust PKI should use for connections.
e. Authentication Type - Select the type of authentication to use when authenticating the RA or EE
component of the OpenTrust PKI to the LDAP directory.
• None - No authentication is performed. If None is selected, continue to Step 4.h on page 22.
• Password - The authentication is performed using the Bind DN and the Bind DN password. If Password is
selected as the authentication type, continue to Step 4.f on page 22.
• SSL - SSL authentication of the RA or EE component of the OpenTrust PKI to the LDAP directory server
is performed using SSL client identity parameters and a certificate that has been granted access rights to
the LDAP directory server. The certificate that has been granted rights to the LDAP server must be either
a PKCS#12 file or a certificate and private key in PEM format. If SSL is selected as the authentication
type, continue to Step 4.g on page 22.
f. To use Password for the authentication type, configure the following properties:
i. Bind DN - The Bind DN is a user name configured in the LDAP directory for a user who is permitted
to search the LDAP directory for OpenTrust PKI RA or EE administrators and certificate requesters/
holders. The user must also have write permissions if certificates and CRLs will be published to
the LDAP directory as described in “Enable Publication of Certificates and CRLs to Directories
” on page 32.
ii. Bind Password - Enter the password that corresponds to the Bind DN.
g. To use SSL for the authentication type, configure the following properties:
ii. On the SSL Client Identity pop-up, select an authentication type and configure the required fields:
• PKCS#12:
◦ PKCS#12 File Path - Browse to and select or enter the directory path and file name for the
PKCS#12 file that has LDAP access rights.
◦ Certificate File Path - Browse to or enter the directory path and file name for a certificate that has
LDAP access rights and the associated private key. The certificate must be in PEM format.
◦ Private Key File Path - Browse to or enter the directory path and file name for the private key
associated with the certificate. The private key must be in PEM format.
◦ Password -If there is a password for the private key, enter the password for the private key.
iii. Server Certificate's DN - Enter the DN of the certificate used to authenticate the LDAP directory
server to the RA or EE component of the OpenTrust PKI. The DN should be provided by the LDAP
administrator.
i. Version - Choose the version of the LDAP protocol supported by the directory server.
j. Automatically Follow References to Other LDAP Servers - If the LDAP directory for which the connection
is being configured is integrated with other LDAP directories, select this option to allow connections to the
other LDAP directories. The configured authentication settings will be used on all referenced servers.
5. To verify that the settings have been entered correctly and the LDAP directory is accessible, click Test
Connection.
6. Click Save.
The OpenTrust PKI contains a pre-configured internal datasource which can be used to enroll SCEP devices. The default
configuration values of the internal SCEP datasource can be edited to include additional attributes.
Datasources are used to automatically complete the fields required for certificate requests - for example, to put the
certificate requester's common name in a certificate subject. The values required in certificate requests can be extracted
from one or more datasources. In the OpenTrust PKI user interface, datasources are associated with certificate
management profiles. Multiple datasources can be associated with a single certificate management profile.
If more than one datasource is associated with a certificate management profile, one datasource is designated as the
primary datasource and the other associated datasources are considered secondary datasources for the certificate
management profile. The primary datasource is the datasource selected in the enrollment method options for the
certificate management profile. Secondary datasources for the certificate management profile are datasources that
meet the following criterion: The secondary datasource configuration contains an identifier attribute that is selected
as an attribute in the primary datasource configuration. The attributes selected in the configurations for both primary
and secondary datasources are available for use in the OpenTrust PKI user interface to be dragged and dropped into
certificate management profile configuration fields.
1. Log in to the user interface for the RA component of the OpenTrust PKI as an administrator with the Profiles
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. On the Datasources page, choose to Create a New LDAP Datasource, to Modify, Copy, or Remove an
existing LDAP datasource, or to edit the internal SCEP datasource. If the choice is to edit the pre-configured
internal SCEP datasource, continue to Step 7 on page 24.
Note: An LDAP datasource cannot be removed if it is associated with a certificate management profile
or an authentication scheme that is associated with a certificate management profile.
4. If the choice is to create a new LDAP datasource or modify or copy an existing LDAP directory, on the LDAP
Datasource page, configure the following LDAP datasource options:
a. Name - Enter a name and description for the LDAP datasource. The name and description will be visible in
other parts of the user interface, for example, when selecting which LDAP datasource to use for a particular
certificate management profile. Providing detailed information in the name and description fields will make it
easier to select the correct LDAP datasource in other parts of the user interface.
b. Connection Settings - Select the search criteria to use when the RA component of the OpenTrust PKI
connects to the LDAP datasource:
• Directory - Select a configured LDAP directory connection from the drop-down menu. All directory
connections that have been configured as described in “Configure an LDAP Directory Connection
” on page 21 will be available for selection.
• Search Constraints - This is a generic attribute and value user search filter. Administrators typically
enter: &(objectclass=person)(uid=*)
• Use DN Components - Select this option to include DN components in the list of values returned in the
search result sample.
• Test Search - Enter an attribute and value for performing a directory test search, without surrounding
parentheses. Administrators typically enter: uid=jdoe, where jdoe is the uid value of an entry in the
LDAP directory.
5. Click Search.
6. The search results are a list of user entry attributes from a sample datasource entry matching the search
criteria entered in the Connection Settings options. If the search criteria option to Use DN Components was
selected, the DN component attributes are displayed in the DN Components section of the table. To select
the fields available during searches and communication with the RA or EE component of the OpenTrust PKI
and to determine which LDAP attributes will be available to the OpenTrust PKI for use as default values for
DN components, form parameters and Subject Alternative Name components when generating certificate
requests, in the DN Components and LDAP Attributes sections of the table, select LDAP attributes and their
corresponding options and values. Use the More Details/Less Details toggle to display more or less LDAP
attributes. For descriptions of the columns, mouse over each column name.
7. If configuring an LDAP datasource, skip this step. To add attributes to the internal SCEP datasource, click
Add More. To remove attributes, use the X icon. Only attributes that have not been associated with a certificate
management profile can be deleted.
8. Click Save.
Note: Once a datasource has been saved, an administrator cannot deselect the associated identifiers.
To choose different identifiers, a new datasource must be created. If certificates have not yet been
created using the datasource, administrators can delete the datasource.
1. Log in to the user interface for the RA component of the OpenTrust PKI as an administrator with the Profiles
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. On the Authentication Schemes page, choose to Create a New Authentication Scheme or to Modify, Copy, or
Remove an existing authentication scheme.
4. If the choice is to create a new authentication scheme, select the type of authentication scheme to configure:
• LDAP - LDAP authentication schemes allow users to authenticate using the information stored
in an LDAP directory associated with a datasource, configured as described in “Configure/Add a
Datasource” on page 23.
• Master Password - If many SCEP devices will be enrolled, administrators may prefer to use a common
master password for all SCEP devices.
5. Click Create.
6. On the authentication scheme configuration page, enter a Name and Description for the authentication scheme.
The name and description will be visible in other parts of the user interface, for example, when selecting which
authentication scheme to use for a particular certificate management profile. Providing detailed information in the
name and description fields will make it easier to select the correct authentication scheme in other parts of the
user interface.
7. Configure the authentication scheme parameters required for the selected authentication scheme type:
• Datasource - From the drop-down menu, select a configured datasource. The directory associated with the
selected datasource must contain password entries for users who will become certificate holders.
• Master Password - Enter a custom master password or click Generate to generate a random master
password.
8. Click Save.
1. Log in to the user interface for an OpenTrust PKI RA component as an administrator with the Profiles
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. On the Password Policies page, choose to Create a New Password Policy or to Modify, Copy, or Remove an
existing password policy.
Note: A password policy cannot be removed if it is associated with a certificate management profile.
4. If the choice is to create a new password policy or modify or copy an existing password policy, on the Create a
New Password Policy page, configure the following password policy options:
a. Name and Title - Enter a name and title for the password policy. The name and title will be visible in other
parts of the user interface, for example, when selecting which password policy to use for a particular
certificate management profile. Providing detailed information in the name and title fields will make it easier
to select the correct password policy in other parts of the user interface. The default title will be displayed
in the user interface when language-specific titles have not been configured or when the language used
by a certificate requester or certificate holder is not included in the list of configured language-specific
titles. When language-specific titles have been configured, the language-specific titles will be displayed for
configured languages that correspond to the language used by a certificate requester or certificate holder
as set in the Web browser being used to access the OpenTrust PKI. It is possible to configure titles for
any language. To configure titles in an additional language, use the Add More button, enter a two-letter
abbreviation for the language in the drop-down menu, and enter the language-specific title in the text field.
d. Minimum Number of Unique Characters - The number of unique characters required in the password. For
example, if the maximum length is four characters and the minimum number of unique characters is four,
then each of the four numbers in the password must be unique, such as 1234. Another example would be
a password with a maximum length of seven characters and a minimum of four unique characters, where
1122334 would be a valid password.
e. Forbid Sequences - Forbid successive number and letter sequences, including both ascending and
descending sequences, such as 1234, 987654, ABCD, and DCBA.
f. Forbidden Passwords - Forbid specific password choices, such as 1234 or MYPASSWORD. Forbid
multiple passwords by separating them with a space or by entering each forbidden password on a separate
line, for example:
1234 MYPIN BADPIN 9876
or
1234
MYPIN
BADPIN
9876
5. Use Password Rules - To configure specific allowed characters or character subsets, select the Use Password
Rules checkbox. To configure multiple password rules, click Add More. To define the number of rules that must
be complied with, choose a number.
6. Click Save.
7. View the "The password policy has been correctly saved." success message.
By default, in new installations of OpenTrust PKI versions 4.5.0 and higher, all of the pre-configured certificate
management profiles with a browser usage policy selection use the default browser usage policy and all new certificate
management profiles will use the EE browser usage policy. The EE browser usage policy is described in more detail in
“Configure EE Component's Module Settings ” on page 57. In upgrades from versions earlier than OpenTrust PKI
version 4.5.0, all of the pre-configured certificate management profiles with a browser usage policy selection use the
built-in browser usage policy and all new certificate management profiles will use the EE browser usage policy.
The default browser usage policy and the built-in browser usage policy contain the same settings. The default browser
usage policy settings can be edited whereas the built-in browser usage policy is not configurable.
The browser usage policy settings for Firefox cannot be configured and the unconfigurable behavior is as follows:
• Private keys and certificates are stored in the browser keystore (scope is Firefox-only, not the Windows user
context)
• For centralized enrollment methods, the private key and certificate are imported manually into the browser.
Some settings will not work if the certificate requester has a limited account on the Windows machine. A browser usage
policy configuration for limited account users should include:
• User context
1. Log in to the user interface for an OpenTrust PKI RA component as an administrator with the Profiles
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. On the Browser Usage page, choose to Create a New Browser Usage Policy or to Modify, Copy, or Remove
an existing browser usage policy.
Note: A browser usage policy cannot be removed if it is associated with a certificate management
profile. If the browser usage policy selected in the EE component's Module Settings configuration,
described in “Configure EE Component's Module Settings ” on page 57, is deleted, the built-in
browser usage policy will be used until the browser usage policy selection in the EE component's
Module Settings is reconfigured.
4. If the choice is to create a new browser usage policy or modify or copy an existing browser usage policy, on
the Create a New Browser Usage Policy page or the Edit Browser Usage Policy page, configure the following
browser usage policy options:
a. Enter a Name and Description for the browser usage policy. The name will be visible in other parts of the
user interface, when selecting which browser usage policy to associate with a certificate management profile
or which browser usage policy to select in the EE component's Module Settings. To make it easier to select
the correct browser usage policy in other parts of the user interface, provide detailed information in the name
and description fields.
b. From the Supported Browsers drop-down menu, select a browser and click Add This Browser. Add all of
the browsers that must be supported for certificate holders or requesters who will use the OpenTrust PKI
to perform processes that require the cryptographic functionality of the Web browser. Certificate holders
whose certificates were created using a certificate management profile with a browser usage policy that
does not include the browser they are using when trying to perform the cryptographic processes will be
unable to complete the cryptographic processes in the OpenTrust PKI. Certificate requesters who try
to request a certificate, as described in the "Obtain Certificates" section of the OpenTrust PKI Lifecycle
Administrator Guide, from a certificate management profile that uses a browser usage policy that does
not support the configurations in browser being used to make the certificate request are not allowed to
complete the certificate request in the browser that is not supported by the certificate management profile.
The configuration order of the selected browsers is not important; the up and down arrows are provided for
the convenience of the administrator configuring the browser usage policy.
• Machine Context - Select this option to store the private key and certificate in the machine context
instead of in an individual user context. Certificates held by people should be stored in the user context.
Certificates held by servers or machines should be stored in the machine context. This option is used for
private key generation for decentralized enrollment methods, private key import for centralized enrollment
methods, and for certificate import for centralized and decentralized enrollment methods. For IE on Vista
or Windows 7, "Machine Context" is supported for certificate and PKCS#12 imports for decentralized and
centralized enrollment methods if IE is being used by a Windows Administrator.
• Enable Private Key Export - Select this option to enable certificate holders who have imported their
certificate to a Web browser and want to export the certificate to be able to export the corresponding
private key from the Web browser, so that the certificate and private key can be imported to and used in
another browser, such as when an employee needs to change workstations or a company does not want
to re-issue a certificate each time the certificate holder's Web browser is changed.
• Default KSP/CSP - The Key Service Provider or Cryptographic Service Provider that will be displayed first
in the drop-down menu list of Cryptographic Service Providers available for selection on the OpenTrust
PKI's EE component when requesting a certificate, as described in the "Obtain Certificates" section of
the OpenTrust PKI Lifecycle Administrator Guide, using a supported version of the Internet Explorer
browser. The Key Service Provider/Cryptographic Service Provider selection option is only available to
certificate requesters when the certificate management profile selected during the certificate request is
configured to use a decentralized enrollment process and a browser usage policy that includes support
for Internet Explorer browsers. In certificate management profiles that use enrollment processes that are
not decentralized, the configured default KSP/CSP selection is ignored and not displayed to certificate
requesters during the certificate request process. In certificate management profiles that only contain
support for Firefox browsers, the default KSP/CSP selection cannot be configured and the certificate
requester does not have the option to select a Key Service Provider/Cryptographic Service Provider when
making a certificate request, as Firefox ignores all browser usage policy settings.
• Allowed KSPs/CSPs - The list of Key Service Providers or Cryptographic Service Providers that will be
displayed as available for selection on the OpenTrust PKI's EE component when requesting a certificate,
as described in the "Obtain Certificates" section of the OpenTrust PKI Lifecycle Administrator Guide, using
a supported version of the Internet Explorer browser. The list of Key Service Providers or Cryptographic
Service Providers available for selection when requesting a certificate include the Allowed CSPs that
are available on the computer where the browser being used to make the certificate request is installed.
To enable the use of all KSPs/CSPs available on the certificate requester's computer without restriction,
delete the pre-configured Allowed KSP/CSP fields. The Key Service Provider/Cryptographic Service
Provider selection option is only available to certificate requesters when the certificate management
profile selected during the certificate request is configured to use a decentralized enrollment process and
a browser usage policy that includes support for Internet Explorer browsers. If none of the configured
allowed KSPs/CSPs are found on the certificate requester's computer, the certificate requester will be
unable to complete the certificate request process.
• Key Protection - Select a protection level for the private keys generated for certificates created using a
certificate management profile that uses the browser usage policy being configured:
◦ None - No protection is applied to the private keys. When authenticating to a software application with
a certificate, the certificate is used for authentication. The certificate holder is not asked to enter a
password when accessing the software application because possession of the private key associated
with the certificate is considered sufficient for the authentication.
◦ Strong - When a certificate request is made on the OpenTrust PKI' EE component using a supported
Internet Explorer browser and CSP, the certificate requester is prompted to complete a series of
Windows pop-ups related to "Creating a New RSA Exchange Key." While completing the Windows pop-
ups, which are used to create the private key for their certificate, the certificate requester is prompted to
protect the private key using either medium-level protection, usually selected by default in the Windows
pop-ups, in which the Web browser will prompt the certificate holder to confirm the use of the certificate
for authentication during each authentication to a software application that requires the certificate, or
using high-level protection, in which the certificate requester configures a password for the private
key before the key is generated, while requesting the certificate, and then is prompted to enter the
private key password when being authenticated by a software application that uses certificate-based
authentication.
◦ Enforce Password Protection - The requester configures a password for the private key before the
key is generated. After importing the certificate into the Web browser being used to access the user
interface for the OpenTrust PKI's EE component, the certificate holder will be required to enter a
password when using the certificate to authenticate to a software application.
• KSP Key Usages - To set flags for use in the MS CertEnroll API by external software or middleware, such
as an HSM or smart cards, select allowed usages for the private keys generated for certificates created
using a certificate management profile that uses the browser usage policy being configured:
◦ Allow Decryption - The keys can be used to decrypt content, such as content received in email or stored
on volumes or disks. This key usage is recommended for most implementations. Before de-selecting
this key usage, consult an assigned IDnomic technical representative.
◦ Allow Signing - The keys can be used for signing, such as when signing email or documents. An
example of an external software application that would use the signature flag is the IDnomic SPI
application. This key usage is not recommended for most implementations. Before selecting this key
usage, consult an assigned IDnomic technical representative.
◦ Allow Key Exchange - The keys can be used to establish key agreement between entities, such as
during SSL authentication. This key usage is recommended for most implementations. Before de-
selecting this key usage, consult an assigned IDnomic technical representative.
◦ Allow All Possible Usages - The keys can be used to decrypt content, for signing, and for establishing
key agreement between entities. This key usage is not recommended for most implementations. Before
selecting this key usage, consult an assigned IDnomic technical representative.
• CSP Key Type - To set flags for use in the MS CertEnroll and XEnroll APIs that specify the intended use
of a key for a legacy cryptographic service provider (CSP) by third-party software or middleware, such
as an HSM, select a key type for the private keys generated for certificates created using a certificate
management profile that uses the browser usage policy being configured. Legacy CSPs can support at
most one signature algorithm (AT_SIGNATURE) or one encryption algorithm (AT_KEYEXCHANGE).
◦ Do Not Define the Key Type (AT_NONE) - The intended use for the private keys is not identified. This
option can be selected if the provider that supports the key is a Cryptography API: Next Generation
(CNG) key storage provider (KSP).
◦ Decryption or Key Exchange (AT_KEYEXCHANGE) - The private keys can be used for encryption
(including key exchange), decryption, and signing using RSA algorithms. This is the recommended
key type for most implementations. Before selecting another key type, consult an assigned IDnomic
technical representative.
◦ Signature Only (AT_SIGNATURE) - The private keys can be used for signing but not decryption or
encryption.
• CSP Provider Type - Select RSA or Other. If Other is selected, enter the value provided by the
CSP provider. This option should only be used in consultation with an assigned IDnomic technical
representative.
5. Click Save.
To configure the options for metadata to associate with certificate form parameters:
1. Log in to the user interface for an OpenTrust PKI CA component as an administrator with the Profiles
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. On the Metadata page, choose to add a new metadata type or edit an existing metadata type. If the choice is
to create a new metadata type, click Create a new Metadata. If the choice is to edit an existing metadata type,
select the metadata type and continue to Step 5 on page 29.
4. On the metadata configuration page, enter an Identifier for the metadata type. The identifier will be visible in
other parts of the user interface, for example, when selecting which metadata type to use for an addition form
parameter in a certificate management profile or when configuring holder match settings. Providing detailed
information in the identification field will make it easier to select the correct metadata type in other parts of the
user interface.
• Logged - The metadata will be added to audit logs related to certificates created with this metadata. If this
option is selected, administrators will be able to find the metadata type listed in the Details drop-down menu
on the Audit Logs | Logs Search page of the user interface for the Logs component. After selecting the
metadata type in the Details drop-down menu, in the text field, the administrator can enter a valid additional
form parameter, subject alternative name, or subject DN component that was used to generate metadata for a
certificate. The metadata type will not be available in the Details drop-down menu until at least one certificate
has been created using the metadata type.
• Searchable on the EE - The metadata will be available in the search criteria options when searching for
certificates using the user interface of the EE component.
• Searchable on the RA - The metadata will be available in the search criteria options when searching for
certificates using the user interface of the RA component.
6. To save the metadata type, click Save. To delete the metadata type, click Remove. Deleting the metadata type
will remove the metadata type from the search criteria available when searching for certificates on the RA or EE
components.
Note: A metadata type cannot be removed if it has been used to generate a certificate.
The default holder match settings, used before any optional additional holder match settings are configured and/
or selected, cannot be configured and use the certificate Subject DN (all of the DN components in the certificate) to
determine the number of certificates already held by a certificate requester. Using the default holder match settings,
the certificate holder would have to request a certificate containing exactly the same DN as a certificate or certificates
already generated from the same certificate management profile for the request to count as a match. The request would
only be rejected if the maximum number of allowed certificates per holder is set to one in the certificate management
profile or the requester already has the maximum number of certificates allowed by the certificate management profile.
The configurable, non-default, holder match settings allow administrators to further refine how holder matches are made,
using certificate DNs and certificate metadata.
For certificate management profiles that use DN components, subject alternative names, or additional form parameters
that are fixed, mandatory, or populated from an LDAP directory, requests for certificates made by the same person
are likely to produce holder matches. When a certificate management profile is configured to use optional Subject DN
components or information entered manually by the requester, the holder match results are less likely, resulting in a
greater possibility that someone could obtain more than the configured allowed number of certificates per certificate
management profile, despite the configured holder match settings, and placing greater responsibility for preventing
holder matches on administrators who approve enrollment requests.
When a certificate request is denied because the request results in a holder match, a message indicating that, "This
user already has the maximum number of allowed certificates." is displayed to the certificate requester. The request is
not recorded on the OpenTrust PKI RA component and is not logged in the OpenTrust PKI audit logs. Administrators
responsible for the IDnomic Credential Management System application and the AEP add-on module for the OpenTrust
PKI configure the holder match settings to avoid inadvertently providing more than the required number of certificates to
an individual server or smart card holder.
Holder matching is performed on a per-certificate management profile basis, with one exception: during self-revocation,
when a certificate holder is authenticated, the OpenTrust PKI searches for certificates based on holder matches for all
certificate management profiles.
1. Log in to the user interface for an OpenTrust PKI RA component as an administrator with the Profiles
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. On the Certificate Holder Match page, in the Action column, click Configure to configure one of the available
holder match types:
• Permissive - Using the logical operator OR, when searching for certificate holders to count the number of
certificates already held by a certificate requester, the OpenTrust PKI uses the certificate DN and certificate
metadata to search for certificate holder matches. This means the holder matches can contain any of the
selected search criteria, which can include the certificate DN and/or any or all of the metadata types. For
example, if one of the form parameters configured for a certificate management profile is configured to be
tagged as a configured metadata type, and the permissive holder match configuration includes a selection of
that metadata type and the DN, the certificate requester would need to have a match for either the selected
metadata type or the DN to return a holder match and be denied an additional certificate. In a more detailed
example, if a certificate requester requested certificates from a certificate management profile with the
maximum number of certificates per holder set to one, using a different DN but using the same administrator
email addresses, such as [email protected] and [email protected], in a certificate
request with the "Administrator's Email" form parameter tagged as metadata type "admin emails," the second
certificate request would be denied because a holder match would be returned based on the administrator
email addresses.
• Strict - Using the logical operator AND, when searching for certificate holders to count the number of
certificates already held by a certificate requester, the OpenTrust PKI uses the certificate DN and certificate
metadata to search for certificate holder matches. This means the holder matches must contain all of the
selected search criteria, which can include the certificate DN and/or any or all of the metadata types. For
example, if one of the form parameters configured for a certificate management profile is configured to be
tagged as a configured metadata type, and the strict holder match configuration includes a selection of that
metadata type and the DN, the certificate requester would need to have a match for the selected metadata
type and the DN to return a holder match and be denied an additional certificate. In a more detailed example,
if a certificate requester requested certificates from a certificate management profile with the maximum
number of certificates per holder set to one, using the same DN but using different email addresses, such as
[email protected] and [email protected], in a certificate request with the "Administrator's
Email" form parameter tagged as metadata type "admin emails," the second certificate request would be
approved because a holder match would not be returned given that the email addresses are different.
4. On the Permissive Match or Strict Match configuration page, choose whether to use the DN components for
holder matching.
5. Select the metadata types to use for holder matching. All configured metadata types will be available for
selection. See “Configure Metadata Types” on page 29 for more information about configuring metadata
types. The DN and metadata type selections determine matches according to the following rules:
• In a permissive match with DN selected, there is a match if at least one of the selected items match: the DN or
any selected metadata type.
• In a permissive match with DN not selected, there is a match if at least one of the selected items match: any
selected metadata type.
• In a strict match with DN selected, there is a match if all selected items match: DN and all selected metadata
types.
• In a strict match with DN not selected, there is a match if all selected items match: all selected metadata types.
6. Click Save.
8. To configure another holder match type or select the holder match type to be applied to the certificate
management profiles, navigate to the Settings | Policies | Certificate Holder Match page.
9. On the Certificate Holder Match page, to configure another holder match type, repeat Step 3 on page 30 to
Step 7 on page 31. To select which holder match settings will be applied to certificate management profiles,
continue to the next step.
10. To set the holder match rules that will be used to determine how many certificates a person can hold per
certificate management profile, in the drop-down menu, select the strict, permissive, or the default certificate
holder match settings and click Choose this Profile. Only the default match holder type and holder match types
that have been configured will be available for selection in the drop-down menu.
12. In multi-host server environments where the OpenTrust PKI RA component is not hosted on the same
server as the OpenTrust PKI EE component, to make the holder match settings immediately available on
the EE component, follow the synchronization instructions in “Configure EE Component's Module Settings
” on page 57.
To publish certificates in an LDAP directory, create an LDAP publication configuration. To publish certificates in an
Active Directory forest, create an Active Directory forest publication configuration. To be able to publish certificates in
Active Directory, OpenTrust PKI must belong to the Active Directory's Cert Publishers groups in each domain where the
OpenTrust PKI will publish certificates or CRLs.
To publish a CRL in an LDAP directory, create an LDAP publication configuration. Certificate Revocation Lists cannot
be published using Active Directory forest publication configurations. To publish a CRL to an Active Directory forest,
create an LDAP publication configuration and use it to publish the CRL in the Active Directory configuration partition of
the closest domain controller. For additional guidance, contact an assigned IDnomic technical representative.
To enable the publication of certificates and CRLs to LDAP directories and the publication of certificates to
Active Directory forests:
1. Log in to the user interface for an OpenTrust PKI RA component as an administrator with the Profiles
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. On the Publication page, choose to Create a New publication configuration or to Modify or Remove an existing
publication configuration.
4. If the choice is to create a new publication configuration, on the Publication page, choose to create a publication
configuration type.
• Active Directory forest - To publish certificates in Active Directory forests containing multiple domains.
Domain controllers are identified by the OpenTrust PKI using DNS resolvers.
5. On the General Information page, enter a Name for the publication configuration. The name will be visible in
other parts of the user interface, such as when selecting which publication configuration to associate with a
certificate management profile. To make it easier to select the correct publication configuration in other parts of
the user interface, provide detailed information in the name field.
6. If configuring an LDAP publication configuration, in the Certificate match type drop-down menu, choose how to
match certificates to directory entries:
• DN - For certificate publication, the certificate's subject DN is equal to the DN for the entry in the directory. For
CRL publication, the DN of the CRL issuer is equal to the DN for the entry in the directory. : "DN" matching
means searching for a LDAP entry whose DN is the DN of the CRL Issuer "Filter" matching means searching
for a LDAP entry whose attributes match the attributes of the CRL Issuer.
• Filter from Certificate - For certificate publication, if the certificate subject DN components do not match the
DN components configured for directory entries, select this method and use the Add More Filters button to
configure which certificate subject DN components to match to which LDAP entry attribute. For each certificate
subject DN component selected from the drop-down menu, enter the corresponding LDAP attribute. For
example, if the User ID subject DN component in a certificate will correspond to the cn attribute for LDAP
entries, select User ID from the drop-down menu and enter cn in the LDAP entry attribute text field.
For CRL publication, if the issuer DN components do not match the DN components configured for directory
entries, select this method and use the Add More Filters button to configure which CRL issuer DN components
to match to which LDAP entry attribute. For each CRL issuer DN component selected from the drop-down
menu, enter the corresponding LDAP attribute. For example, if the User ID DN component for a CRL issuer
will correspond to the cn attribute for LDAP entries, select User ID from the drop-down menu and enter cn in
the LDAP entry attribute text field.
If more than one filter is configured, the OpenTrust PKI will publish the certificates or CRLs to the directory
entry matching all configured filter criteria, using a logical AND operator for matching. If more than one
directory entry matches the criteria, the OpenTrust PKI will not publish the certificates or CRLs.
To use an optional constraint, enter a generic directory entry attribute and value user search filter, without
surrounding parentheses. Administrators typically enter: objectClass=user
7. If configuring an Active Directory forest publication configuration, configure the options unique to Active Directory
forest publication configuration:
a. To configure the Match filters for certificate publishing, use the Add More Filters button to configure
which certificate subject DN components to match to which directory entry LDAP attribute. For each
certificate subject DN component selected from the drop-down menu, enter the corresponding directory
entry LDAP attribute. For example, if the User ID subject DN component in a certificate will correspond
to the msUPN LDAP attribute for directory entries, select User ID from the drop-down menu and enter
userPrincipalName in the LDAP attribute text field.
If more than one filter is configured, the OpenTrust PKI will publish the certificates to the directory entry
matching all configured filter criteria, using a logical AND operator for matching. If more than one directory
entry matches the criteria, the OpenTrust PKI will not publish the certificates.
To use an optional constraint, enter a generic directory entry attribute and value user search filter, without
surrounding parenthesis. Administrators typically enter: objectClass=user
b. To configure the Active Directory Site of the OpenTrust PKI, enter the domain name component used
to identify the site in which the OpenTrust PKI is located. The Active Directory administrator can use the
Active Directory Site and Services MMC to determine which site the OpenTrust PKI is located in. To publish
certificates, the OpenTrust PKI accesses: the closest domain controller if certificates can be published in
the site the OpenTrust PKI belongs to and the first domain controller if there are several domain controllers
available. The OpenTrust PKI follows the priority order (SRV Record Priority) defined by the Active Directory
administrator. If a domain controller has not been declared for the directory entry's domain in the site in
which the OpenTrust PKI is located, the OpenTrust PKI will search the Active Directory forest domain
controllers to find the DNS name for the domain for a directory entry that matches.
c. The OpenTrust PKI's RA component must be able to resolve Active Directory records. If the Active
Directory zones are not delegated in the corporate DNS, edit the /etc/resolv.conf file on the RA
component to include the IP address of the Active Directory forest DNS name. For example, if the IP
address of the Active Directory forest's DNS server is 172.18.0.14, add nameserver 172.18.0.14 to the
file.
8. In the "Directories" field for LDAP publication configurations and in the "Global Catalog" field for Active Directory
publication configurations, select a configured directory connection. All directory connections configured
as described in “Configure an LDAP Directory Connection ” on page 21 will be available for selection.
Use the plus sign to select multiple directory connections. A certificate or CRL is only published in one of the
directories associated with the selected directory connections. The OpenTrust PKI's publication process scans
the directories in the configured order and publishes the certificate in the first directory where an LDAP entry
attribute that meets the Certificate-Directory Entry Matching Criteria, configured in Step 6 on page 32 for
LDAP directories and in Step 7 on page 33 for Active Directory directories, is found. For Active Directory
forest publication configurations, a certificate is not published in the global catalog; the OpenTrust PKI searches
the global catalog to find the domain for the directory entry and then publishes the certificate in the domain for
the directory entry.
9. Enter the LDAP attribute with which the certificate or CRL should be associated when the certificate is written to
the directory or accept the default of userCertificate for certificates and certificateRevocationList
for CRLs.
• Adding - New certificates or CRLs created for the same directory entry are added to the existing certificates or
CRLs stored in the directory.
• Replacing - New certificates or CRLs created for the same directory entry replace existing certificates or CRLs
stored in the directory
11. To remove the certificate from the directory if the certificate is revoked or expires, select Unpublish at
Expiration or Revocation. To leave revoked or expired certificates in the directory, de-select the Unpublish at
Expiration or Revocation option.
13. On the Settings | Repositories | Publication page, verify that the publication configuration has been added to
the list of publication configurations. For LDAP or Active Directory forest publication configurations that will be
used to publish certificates, the process is complete and the publication configuration can be selected for use
in certificate management profiles, as described in “Configure the General Settings” on page 38. For LDAP
publication configurations that will be used to publish CRLs, continue to the next step.
14. For LDAP directory publication configurations, to use the publication configuration to publish CRLs, navigate to
the Settings | Repositories | CRL Publication page.
15. On the CRL Publication page, for each CA whose CRL should be published, using the selected publishing
configuration, use the Click to Edit mouseover and select the publication configuration. When a CA with selected
publication configurations generates CRLs, the CRLs will be published to the directory. The CRL for internal CAs
is automatically updated every day and after each certificate revocation while the server is operating correctly
unless an administrator disables the CRL update functionality when editing the advanced configuration options
for an internal CA, as described in Step 5 on page 14.
1. Log in to the user interface for an OpenTrust PKI RA component as an administrator with the Profiles
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. On the SCEP Policies page, choose to choose to Create a New SCEP Policy or to Modify, Copy, or Remove
an existing SCEP policy.
4. If the choice is to create a new SCEP policy, click Create New SCEP Policy.
5. Enter a Name and Description for the SCEP policy. The name must be a valid URL component. The name
and description will be visible in other parts of the user interface. Providing detailed information in the name and
description fields will make it easier to select the correct SCEP policy in other parts of the user interface.
• Use Dedicated SCEP CA - Select this option to use the pre-configured SCEP CA's certificate to sign and
encrypt communications between the SCEP device and the OpenTrust PKI. The details for the SCEP CA can
be found and edited on the SCEP Policies | Dedicated CA Management tab.
• Use OpenTrust PKI's RA - Select this option to use the OpenTrust PKI's RA's certificate to sign and encrypt
communications between the SCEP device and the OpenTrust PKI.
• Enrollment Process - Choose whether to use a self-enrollment process, try using a self-enrollment process
and use a manual approval process if the self-enrollment process fails, or use a manual approval process.
If the choice is to use a manual approval process, continue to Step 9 on page 34, as all other options are
removed from the UI.
• Authentication Scheme - Select an authentication scheme to use for enrolling SCEP devices. For more
information about authentication schemes, refer to “Configure an Authentication Scheme ” on page 24.
• Certificate Management Profile - Select a certificate management profile to use for enrolling SCEP
devices or choose to use the certificate_profile attribute in the datasource to dynamically select a certificate
management profile during the enrollment process.
8. To configure the mapping rules between the identifier fields of the datasource(s) associated with the selected
authentication scheme and the RDN fields in the SCEP enrollment requests, select an RDN field for each
Identifier field of the datasource.
9. Click Save.
10. View the URL to use when enrolling SCEP devices using this SCEP policy.
11. If using the dedicated SCEP CA, click "Back to List" and select the Dedicated CA Management tab to review
and/or edit the information for the dedicated SCEP CA. If the choice is to edit the dedicated SCEP CA, configure
the following options:
• CA Validity Duration (in Days or YYYY-MM-DD) - Enter the validity duration for the dedicated SCEP CA's
CRL.
• Key Size - Choose the encryption level for the private keys of the certificate for the dedicated SCEP CA.
Selecting a larger key size will result in a more secure certificate. It may take a longer time to generate
larger, more secure keys and to sign a certificate with larger keys. The dedicated SCEP CA is used only for
communication and cannot be used to issue certificates.
The default automatic email configurations cannot be recovered after being edited.
1. Log in to the user interface for the OpenTrust PKI RA component as an administrator with the Profiles
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
• Edit an existing automatic email configuration: In the Name column, click the name of automatic email.
• Create a new automatic email using the template of an existing automatic email: In the "Create a New Profile
from" drop-down menu, select an already configured automatic email to use as a template.
• Create a new automatic email from a blank email template: Click Create a New Profile.
4. On the automatic email configuration page, configure the components and contents of the email:
a. In the Profile field, enter a name for the automatic email. The name will be visible in other parts of the user
interface, for example, when selecting which automatic emails to use for a particular certificate lifecycle
management event. Providing detailed information in the name field will make it easier to select the correct
automatic email in other parts of the user interface. The name of the default automatic emails cannot be
edited. The names of administrator-created automatic emails cannot be edited after being saved.
b. In the email Type drop-down menu, from the list of static certificate lifecycle management event email
types, select the type that corresponds to the automatic email being created or configured. The type
cannot be changed once the automatic email has been selected for use in a certificate management profile
configuration, as described in “Create a Certificate Management Profile” on page 37.
c. In the From and To rows, select an option from the drop-down menu. The email address that corresponds
to the selected option will be used as the From: email address and the To: email address(es) when the
automatic email is sent. For the To: email address, use the corresponding plus and minus signs to add and
remove multiple recipients. The drop-down menus are populated with the possible senders and recipients
appropriate for the selected email type:
• Lifecycle Administrator - The lifecycle administrator's email address, identified by the certificate used to
perform the lifecycle management event. This option is only available in the From: drop-down menu.
• Possible Lifecycle Administrators - The email addresses of all lifecycle administrators with the appropriate
rights for the lifecycle management event. This option is only available in the To: drop-down menu.
• User Contact - The certificate holder's email address, as defined by the certificate management
profile used to create the certificate. For lifecycle events related to certificate requests or to certificate
management profiles that do not use a User Contact parameter, the email address configured in the
certificate request is used.
• User Email - The certificate holder's email address, as defined by the certificate management profile used
to create the certificate. For lifecycle events related to certificate requests or to certificate management
profiles that do not use a User Email parameter, the email address configured in the certificate request is
used.
• Requester - The email address for the person performing the action in the certificate lifecycle event.
For example, if a lifecycle administrator requests the revocation or recovery of a certificate, the lifecycle
administrator is considered to be the requester, while the certificate holder, the subject of the certificate, is
not.
• Static - To send the email to the same recipient each time the lifecycle event takes place, enter the
recipient's email address in the text entry field. Multiple static entries can be configured for an automatic
email using the plus sign to add additional recipients.
d. For the email Subject and Body content, if creating a new automatic email, click the link in the Email row
to display and then configure the required settings; if configuring an existing automatic email, configure the
required settings:
i. From the Language drop-down menu, select a language in which to send the email. Use the
corresponding plus and minus icons to add and remove versions of the email in additional languages.
Include all of the languages used by certificate holders. The default automatic emails contain pre-
configured versions of the emails which can be used as is or edited. When a certificate is requested, the
OpenTrust PKI creates information for the certificate that includes the language selected in the browser
used to make the certificate request. An administrator can later change the language associated with
a certificate by using the Registration Authority | Certificate Information | Modify Certificate Information
functionality, as described in the OpenTrust PKI Lifecycle Administrator Guide. When an email is sent
to a certificate holder and a version of the email that corresponds to the language identified in the
certificate holder's certificate information is available in the automatic email configurations, the email
is sent to the recipient in that language. For multi-recipient emails, each recipient receives the email in
their own language. In cases where the language identified in the certificate information does not have a
corresponding version in the automatic email configuration, the email is sent in English.
ii. To add available variables to the Subject or Body of the email, from the Variables drop-down menu,
select a variable and click Add to Body or Add to Subject. The available variables include values stored
in the OpenTrust PKI database, such as names or other stored certificate holder information; values
stored in OpenTrust PKI configurations, such as administrator email addresses configured in the
Module Settings configuration area for each component; and information generated by the OpenTrust
PKI application, such as error numbers. The default versions of the automatic emails contain the
variables relevant to the certificate lifecycle event that precipitates the emails. When creating additional
emails for a particular email type, administrators should consider using the same variables in the
administrator-created automatic emails that exist in the default emails.
iii. Using the variables as needed, edit the default content or write new content in the Subject and Body
fields. Verify that the content is relevant for the selected email type and that the included variables
should be exposed to the configured recipients.
5. In the attachments row, select the attachments to include in the email and choose whether to include a .zip file
that includes all of the selected attachments.
• Encrypt for Administrator - This option will encrypt the email sent to the lifecycle administrator who provides
the certificate password to the certificate holder. The automated emails that use this option are usually related
to PKCS#12 certificates and information associated with PKCS#12 certificates.
7. Click Save.
After a certificate category has been configured, certificate categories are displayed on the Settings | Certificates
| Certificate Management Profiles page to organize the list of certificate management profiles for administrators.
Administrators can also select a certificate category from a drop-down menu when configuring the General tab for
certificate management profiles, as described in “Create a Certificate Management Profile” on page 37. When a
certificate management profile is associated with a certificate category, certificate requesters will be able to select the
certificate category before selecting a certificate management profile during the certificate request process described in
the "Obtain a Certificate" section of the OpenTrust PKI Lifecycle Administrator Guide.
1. Log in to the user interface for an OpenTrust PKI RA component as an administrator with the Profiles
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. On the Certificate Categories page, choose to Create a New Certificate Category or to Modify, Copy, or
Remove an existing certificate category.
Note: A certificate category cannot be removed if it is associated with a certificate management profile.
4. If the choice is to create a new certificate category, enter a Name for the certificate category.
5. Enter the Title values for the certificate category. The title will be used to display the certificate category in other
parts of the user interface, such as in the list of certificate categories on the Certificate Categories page, in the
list of certificate management profiles on the Settings | Certificates | Certificate Management Profiles page, in the
list of certificate categories available when configuring a certificate management profile, and in the user interface
for the certificate request process. Providing detailed information in the title fields will make it easier to select
the correct certificate category in other parts of the user interface. The default title will be displayed in the user
interface when language-specific titles have not been configured or when the language used by a certificate
requester or certificate holder is not included in the list of configured language-specific titles. When language-
specific titles have been configured, the language-specific titles will be displayed for configured languages that
correspond to the language used by a certificate requester or certificate holder as set in the Web browser being
used to access the OpenTrust PKI. It is possible to configure titles for any language. To configure titles in an
additional language, use the Add More button, enter a two-letter abbreviation for the language in the drop-down
menu, and enter the language-specific title in the text field.
6. Click Save.
1. Log in to the user interface for an OpenTrust PKI RA component as an administrator with the Profiles
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. On the Certificate Management Profiles page, choose to: Create a New Certificate Management Profile or to
Modify, Copy, or Remove an existing certificate management profile.
Note: A certificate management profile cannot be removed after being used to enroll a certificate.
4. If the choice is to create a new certificate management profile or modify or copy an existing certificate
management profile, on the General tab, configure the following certificate management profile options:
a. Enter a Name for the certificate management profile. The name must be unique in the list of certificate
management profiles. The name will only be configurable until the first time the certificate management
profile is saved.
b. Enter the Title values for the certificate management profile. The title will be used to display the certificate
management profile in other parts of the user interface, such as in the list of certificate management profiles
on the Settings | Certificates | Certificate Management Profiles page and in the user interface for the
certificate request process. Providing detailed information in the title fields will make it easier to select the
correct certificate management profile in other parts of the user interface. The default title will be displayed
in the user interface when language-specific titles have not been configured or when the language used
by a certificate requester or certificate holder is not included in the list of configured language-specific
titles. When language-specific titles have been configured, the language-specific titles will be displayed for
configured languages that correspond to the language used by a certificate requester or certificate holder
as set in the Web browser being used to access the OpenTrust PKI. It is possible to configure titles for
any language. To configure titles in an additional language, use the Add More button, enter a two-letter
abbreviation for the language in the drop-down menu, and enter the language-specific title in the text field.
c. Select a Category for the certificate management profile or accept the default uncategorized status of the
certificate management profile. For more information about the use of certificate categories, refer to “Create
Certificate Categories” on page 37.
• CA - Select the CA to use to sign certificates generated using the certificate management profile. The list
of available CAs includes all internal CAs with a valid certificate, as listed on the Certificate Authority | CA
Management | List of CAs page described in “View Internal CAs ” on page 13 . The default CA is the CA
configured as the default CA on the Certificate Authority | CA Management | List of CAs page.
• Validity Duration - Certificates created using the certificate management profile will be valid for the period
of time selected:
◦ Certificates Default Validity Duration for Selected CA - The value entered for the selected CA in
the "Certificates Default Validity Duration" field when configuring the CA, as described in “Manage
CAs” on page 7. This value will be used for the validity duration when the CA default validity duration is
not longer than the CA lifetime. When the CA default validity duration is longer than the CA lifetime, the
value is ignored and the certificate will be valid for the duration of the CA lifetime.
◦ CA Lifetime - The lifetime of the selected CA, meaning for as long as the selected CA has a valid
certificate.
◦ Custom - Use this option to configure a custom validity duration for certificates created using the
certificate management profile. This value will be used for the validity duration when the custom validity
duration is not longer than the CA lifetime. When the custom validity duration is longer than the CA
lifetime, the value is ignored and the certificate will be valid for the duration of the CA lifetime.
• Maximum Number of Certificates per Holder (0 Means No Limit) - Enter the maximum number of
certificates generated by the certificate management profile that can be held by a single certificate holder.
The value entered will be used in combination with the configured holder match settings described in
“Configure Holder Match Settings” on page 30.
• Browser Profile - Select a browser usage policy to apply to certificates created using the certificate
management profile. All configured browser usage policies will be available for selection. For more
information about the Default browser usage policy, the EE browser usage policy and how browser usage
policies impact certificate requesters, refer to “Configure Browser Usage ” on page 26.
• Publish to Directories - Select the publication configurations to use to publish certificates to LDAP
directories and Active Directory forests. All configured publication configurations, as described in
“Enable Publication of Certificates and CRLs to Directories ” on page 32, will be available for
selection. If a publication configuration is selected, in the Send Publication Error Notifications area,
select the automatic emails to send when certificates cannot be published using the selected publication
configurations. All configured automatic emails that can be used for publication error notifications will
be available for selection. For more information about automatic emails, refer to “Configure Automatic
Emails” on page 35.
• Visible on EE for All Available Processes - This option allows certificate holders, certificate requesters,
and administrators to view the certificate management profile when performing processes governed by
or related to the certificate management profile - such as certificate requests, revocation and recovery
procedures, and searches that contain the certificate management profile - on the Enrollment Entity
component of the OpenTrust PKI in addition to being able to perform the same processes on the
Registration Authority component of the OpenTrust PKI. This option is selected by default because it is
appropriate for most certificate management profiles.
• Authentication Required on EE to See this Profile - When the "Visible on EE for All Available
Processes" option is selected, the "Authentication Required on EE to See this Profile" option is available
to restrict the visibility of the certificate management profile on the EE component to authenticated
certificate holders. The "Authentication Required on EE to See this Profile" option is not selected by
default to make the certificate management profile available for certificate requests, using the enrollment
process configured for the certificate management profile. If the "Authentication Required on EE to See
this Profile" option is selected, only people who already have a certificate trusted by the OpenTrust PKI
EE can request to be enrolled in the certificate management profile or request certificates for other people
using the certificate management profile.
• Use UTF-8 Encoding in Certificate Fields When Possible - Select this option to use UTF-8 encoding
for the values entered and automatically generated for a certificate when a certificate is requested from
the certificate management profile.
5. Click Save. If configuring a new certificate management profile, continue to “Configure an Enrollment
Method” on page 39.
1. Log in to the user interface for an OpenTrust PKI RA component as an administrator with the Profiles
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. On the Enrollment tab, select and configure an enrollment method for the certificate management profile. If the
certificate management profile has already been used to generate certificates, the enrollment method and, in
centralized enrollment processes, the Private Key Escrowing option cannot be modified. When a certificate
requester requests a certificate from a certificate management profile, they are requesting to be enrolled in the
certificate management profile.
is connected to the EE. When using IE, the certificate requester must select a Cryptographic Service Provider
to generate the key pair and transmit the public key to the OpenTrust PKI. When using FireFox, a default
Cryptographic Service Provider is used to generate the key pair and transmit the public key to the OpenTrust
PKI. The public key transmitted to the OpenTrust PKI with the certificate request is included in the "Public Key"
section of the certificate created with the certificate management profile. The certificate can be imported into
the Web browser that generated the key pair, the browser from which the certificate request was made, once
the certificate is delivered to the certificate requester.
If the selected enrollment method for a certificate management profile is decentralized, the certificate
management profile is available for selection on the EE during the certificate request process; when
the certificate management profile is enabled, if configured to be visible on the EE; when the certificate
management profile is configured to require authentication on the EE, if the requester who accesses the
EE is authenticated by certificate; and, when the Certificate Request Right is required, if the requester who
accesses the EE is authenticated by certificate and has the Request Certificate on the EE right for at least
one zone. Certificate management profiles that use a decentralized enrollment method with the "Pre-approval
by an Enrollment Administrator" are displayed in certificate request processes on the RA when the certificate
management profile is enabled.
• Centralized Enrollment - In certificate management profiles in which the enrollment method is centralized,
the key pair for the certificate is generated by the OpenTrust PKI. The public key is included in the "Public Key"
section of the certificate created with the certificate management profile and the certificate can be imported
into a Web browser once the certificate is delivered to the certificate holder.
If the selected enrollment method for a certificate management profile is centralized, the certificate
management profile is available for selection on the EE during the certificate request process; when
the certificate management profile is enabled, if configured to be visible on the EE; when the certificate
management profile is configured to require authentication on the EE, if the requester who accesses the EE is
authenticated by certificate; and, when the Certificate Request Right is required, if the requester who accesses
the EE is authenticated by certificate and has the Request Certificate on the EE right for at least one zone.
Certificate management profiles that use a centralized enrollment method with the "Approval by an Enrollment
Administrator" are displayed in certificate request processes on the RA when the certificate management
profile is enabled.
• Server (Decentralized Enrollment with CSR) - In certificate management profiles in which the enrollment
method is server, the key pair is generated on the server that requests the certificate. A .p10 file is uploaded
to the EE or the RA to communicate the public key to the OpenTrust PKI. This public key is included in the
"Public Key" section of the certificate created with the certificate management profile.
If the selected enrollment method for a certificate management profile is server, the certificate management
profile is available for selection on the EE during the certificate request process; when the certificate
management profile is enabled, if configured to be visible on the EE; when the certificate management profile
is configured to require authentication on the EE, if the requester who accesses the EE is authenticated
by certificate; and, when the Certificate Request Right is required, if the requester who accesses the EE is
authenticated by certificate and has the Request Certificate on the EE right for at least one zone. Certificate
management profiles that use a server enrollment method are displayed in certificate request processes on the
RA when the certificate management profile is enabled.
• Enrollment via SCEP - In certificate management profiles in which the enrollment method is SCEP, the key
pair is generated on the Cisco device that requests the certificate.
Certificate management profiles that use a SCEP enrollment method are never displayed in certificate request
processes on the RA or EE. The certificate request is submitted from the Cisco device and added to the list of
pending certificate requests on the RA. A certificate request can also be pre-approved on the RA and then the
certificate is delivered without being added to the list of pending requests.
If configuring a certificate management profile that uses a server or SCEP enrollment method, continue to
Step 9 on page 44. If configuring a certificate management profile that uses a decentralized or centralized
enrollment method, continue to the next step.
4. If configuring a certificate management profile that uses a centralized enrollment method, to enable recovery of
private keys for certificates, select Private Keys Escrowing.
5. If configuring a certificate management profile that uses a decentralized or centralized enrollment method, select
an enrollment process:
pending certificate requests on the RA; or an administrator submits a certificate request on the RA. If the
required number of administrators approve the certificate request:
◦ For decentralized enrollment methods, which can only be initiated by the certificate requester on the EE, the
private keys are installed in the certificate requester's Web browser when the certificate request is made.
When the certificate request is approved by the required number of administrators on the RA, if configured
in Step 9 on page 44, a notification email will be sent to the certificate requester. The certificate requester
can then import the certificate into their Web browser.
◦ For centralized enrollment methods, the certificate and private key are delivered according to the method
selected in Step 6 on page 43.
If the certificate request is denied by an administrator, a notification email is sent. If the certificate request
expires, a notification email is sent.
LDAP directory values or manually-entered data can be used to identify the certificate requester and the future
certificate holder before the certificate request is submitted. Default values can also be used to pre-populate
some of the fields in certificate request forms. Default values can be configured to be editable by the certificate
requester and/or the approval administrator.
◦ Manual Request - For decentralized enrollment methods and centralized certificate requests initiated
on the EE by the certificate requester: The certificate requester enters the data in the certificate request
form fields manually on the EE. Administrators on the RA find the certificate request and enter data in
the certificate approval form manually.
For centralized certificate requests initiated on the RA by the approval administrator: The approval
administrator enters the data in the certificate request form fields manually on the RA.
Information in the certificate request forms displayed to the certificate requester and the approval
administrator is not pre-populated and does not need to match information available in an LDAP
directory associated with the OpenTrust PKI.
◦ Directory Request on Datasource - For decentralized enrollment methods and centralized certificate
requests initiated on the EE by the certificate requester: The certificate requester enters a unique
identifier to identify themself to the EE. The attributes configured as identifiers in the datasource
selected for the certificate management profile are available for certificate requesters to use on the
EE as identification. After the certificate requester is identified, the form field values that have been
retrieved from the directory for the certificate requester are pre-populated in the certificate request
form fields and the certificate requester can edit the values in the editable certificate request form
fields manually on the EE. Administrators on the RA find the certificate request and enter data in the
certificate approval form manually.
For centralized certificate requests initiated on the RA by the approval administrator: The approval
administrator requests a certificate on the RA and searches for a future certificate holder to receive
the certificate. The attributes configured as search criteria in the datasource selected for the certificate
management profile are available to use as search criteria when the administrator is searching for a
future certificate holder. The future certificate holder receives a certificate, private keys, and password
and can then import the certificate into their Web browser.
◦ User Choice for Manual or Directory Request on Datasource - For decentralized enrollment
methods and centralized certificate requests initiated on the EE by the certificate requester: When
making a certificate request, the certificate requester can choose to use manual entry or search for
an LDAP attribute to use to identify themself to the EE using the Directory Request on Datasource
behavior.
For centralized certificate requests initiated on the RA by the approval administrator: The approval
administrator requests a certificate on the RA. When making the certificate request, the administrator
can choose to use manual entry or search for a future certificate holder to receive the certificate using
the Directory Request on Datasource behavior.
To configure the options unique to User Choice for Manual or Directory Request on Datasource:
2. Specify the number of administrators that must approve the request. The certificate will only be delivered
once the required number of administrators have approved the request. If multiple approvals are
configured, choose whether or not to require the approval administrators to belong to different access
rights groups. These options do not affect the number of administrators that are required to reject a
request: one administrator alone can reject a request.
• Enrollment Administrator Pre-approval - This option is only available for decentralized enrollment methods.
LDAP directory values or manually-entered data can be used to identify the future certificate requester before
the certificate request is submitted. Default values can also be used to pre-populate some of the fields in
certificate request forms. Default values can be configured to be editable by the certificate requester and/or the
approval administrator.
◦ Manual Entry - To pre-approve a certificate request, an administrator with the Enrollment rights for
the zone/certificate management profile on the RA enters data in the certificate request form fields
manually. The future certificate requester receives a notification and password and then makes a
request on the EE for the pre-approved certificate, which generates a private key for the certificate
and installs the certificate and key pair. The certificate management profile must be configured to be
editable by the enrollment administrator to enable the enrollment administrator to edit the information in
the certificate request form during the pre-approval process. Information in the certificate request forms
displayed to the pre-approval administrator and the future certificate holder is not pre-populated and
does not need to match information available in an LDAP directory associated with the OpenTrust PKI.
request, the administrator can choose to use manual entry or search for a future certificate requester
to associate with the pre-approved certificate information using the Directory Selection on Datasource
behavior. The future certificate requester receives a notification and password and then makes a
request on the EE for the pre-approved certificate, which generates a private key for the certificate and
installs the certificate and key pair.
To configure the options unique to Administrator Choice for Manual Entry or Directory Selection on
Datasource:
2. Select an automatic email to use to "Deliver an Automatic Enrollment URL." All configured automatic
emails that can be used for delivery of automatic enrollment URLs will be available for selection. For more
information about automatic emails, refer to “Configure Automatic Emails” on page 35.
3. Specify the number of administrators that must pre-approve the request. The email containing the URL
of the pre-approved certificate request page will only be sent once the required number of administrators
have pre-approved the request. If multiple approvals are configured, choose whether or not to require
the approval administrators to belong to different access rights groups. These options do not affect
the number of administrators that are required to reject a request: one administrator alone can reject a
request.
◦ For decentralized enrollment methods, the certificate and private keys are installed in the certificate
requester's Web browser and a message is displayed on the EE user interface indicating that the certificate
and private key have been installed in the requester's browser and the certificate holder should make a
backup copy of the certificate. If configured in Step 9 on page 44, a notification email will be sent.
◦ For centralized enrollment methods, the certificate and private key are delivered according to the method
selected in Step 6 on page 43.
LDAP directory values or manually-entered data can be used to identify the certificate requester before the
certificate request is submitted. Default values can also be used to pre-populate some of the fields in certificate
request forms. Default values can be configured to be editable by the certificate requester.
6. If configuring a certificate management profile that uses a centralized enrollment method, in the Deliver
PKCS#12 area, select the method to use to deliver the certificate and key pair when certificate requests are
approved:
• Sent by Email - Select an automatic email to use to deliver the certificate and key pair when certificate
requests are approved. All configured automatic emails that can be used for certificate delivery will
be available for selection. For more information about automatic emails, refer to “Configure Automatic
Emails” on page 35.
• Delivered via EE User Interface - To make the certificate and key pair available for download from the EE
user interface:
◦ To make the certificate and key pair available to be downloaded and then imported into a Web browser
by the certificate requester, select Download and Import.
◦ To make the certificate and key pair available for automatic Web browser integration when the
OpenTrust PKI can detect the appropriate settings, select Automatic Web Browser Integration.
2. Select an automatic email to use to deliver the link from which the certificate and key pair can be
downloaded or automatically integrated into a Web browser when certificate requests are approved.
All configured automatic emails that can be used for certificate availability notifications will be
available for selection. For more information about automatic emails, refer to “Configure Automatic
Emails” on page 35.
3. Configure the download duration period for the certificate and key pair in the Storage on the EE
parameters:
a. Duration (in days) - Enter the number of days after a certificate request is approved that the
certificate and key pair should be available to download from the EE user interface.
b. Duration after Download (in hours) - Enter the number of days after a certificate and key pair are
downloaded from the EE user interface that the certificate and key pair should remain available to
download from the EE user interface.
Administrators will have the option to remove the download link before the end of the configured download
durations.
7. If configuring a certificate management profile that uses a centralized enrollment method, the password entered
in a certificate request is used to encrypt the certificate. Choose the method by which a password is created for
the certificate:
• User-selected - The certificate requester enters a password in the certificate request form on the RA or EE.
• Randomly Generated - A password is randomly generated by the OpenTrust PKI for the certificate and
delivered with the certificate approval notification emails.
• Authentication Scheme Populated - The certificate holder's password is retrieved from the LDAP directory
associated with the authentication scheme selected in the self-enrollment process configuration. This option is
only available for self-enrollment processes.
8. If configuring a certificate management profile that uses a centralized enrollment method, select the Allow
escrowing of private keys imported via the connector option to allow key archival with the Auto-Enrollment
Proxy.
Note: This feature requires OpenTrust PKI version 4.8 or higher and Auto-Enrollment Proxy version 2.3
or higher.
9. For decentralized, server, or SCEP enrollment methods, in the Deliver Certificate area, select an automatic
email to use to deliver the certificate when certificate requests are approved. All configured automatic emails
that can be used for certificate delivery will be available for selection. For more information about automatic
emails, refer to “Configure Automatic Emails” on page 35. For certificate management profiles that do not
include a contact email, it may be necessary to add a form parameter, subject alternative name, or subject DN
component to the certificate management profile to require the certificate requester to enter an email address
when requesting a certificate. This step is required for decentralized, server, and SCEP enrollment methods.
10. Click Save. If configuring a new certificate management profile, continue to “Configure Additional Enrollment
Options” on page 44.
To configure the additional enrollment options for the certificate management profile:
1. Log in to the user interface for an OpenTrust PKI RA component as an administrator with the Profiles
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. On the Enrollment tab, to configure the global parameters for a certificate management profile:
a. To restrict access to the certificate management profile when requesting and searching for certificates
to authenticated certificate holders on the EE who have the Request Certificate on the EE right for the
certificate management profile in at least one zone, select "Request Certificate on the EE" Right
Required. This option does not impact access to the certificate management profile on the RA. This option
impacts rights management display. If this option is not selected, the certificate management profile will
not be available in the rights management user interface on the EE because the Request Certificate on the
EE right will not be available to assign to certificate holders, as everyone will be able to request certificates
from the certificate management profile without the need for an assigned right. If this option is selected, only
certificate holders with a grant ability for the Request Certificate on the EE right on the EE will be able to
access the right in the rights management user interface on the EE. This option is not available for certificate
management profiles configured to use the SCEP enrollment method.
b. To require certificate holders to use a revocation code when revoking a certificate generated from the
certificate management profile, choose a revocation code method for the certificate management profile:
• Chosen by the requester - The revocation code used to revoke a certificate is configured by the certificate
requester when the certificate request is made. The revocation code cannot be seen by an administrator
who approves a certificate request. The revocation code is not exposed by the OpenTrust PKI and is not
recoverable.
• Chosen by the validator - The revocation code is configured by the administrator who approves the
certificate request during the certificate request approval process. The administrator must communicate
the entered revocation code to the certificate holder. The revocation code cannot be changed or retrieved
after being configured by the administrator during the certificate request approval process.
• Random - A revocation code is generated by the OpenTrust PKI for the certificate when the certificate
request is made and is displayed to the certificate requester in the request confirmation displayed in the
user interface. The revocation code is not exposed by the OpenTrust PKI and is not recoverable.
c. To apply a configured password policy to passwords and revocation codes used for certificates created
using the certificate management profile, select a password policy. All configured password policies, as
described in “Configure a Password Policy” on page 25, will be available for selection. Passwords and
revocation codes generated by the OpenTrust PKI will comply with the selected password policy. Passwords
and revocation codes entered by administrators and certificate requesters that do not comply with the
selected password policy will be rejected by the OpenTrust PKI.
d. To enroll certificates created using the certificate management profile in a particular zone, configure the
Zone Identification Rules. Select a datasource field to use to identify certificate requesters by zone and
then select the default zone for the certificate management profile. All zones associated with the certificate
management profile, as described in “Configure Zones” on page 79, will be available for selection. The
Zone Identification Rules configuration option will only be available in certificate management profiles that
have been associated with a zone and that are configured to use self-enrollment or automatic completion of
certificate request fields.
• If the certificate management profile is configured to use a centralized enrollment method, to configure the
key generation parameters, select an encryption algorithm and choose an encryption level for the private keys
of certificates created using the certificate management profile. Selecting a larger key size will result in more
secure certificates. It may take a longer time to generate larger, more secure keys and to sign certificates with
larger keys. Certificate requests must include key sizes equal to the value configured here.
• If the certificate management profile is not configured to use a centralized enrollment method, to configure the
allowed key types, select an encryption algorithm and choose a minimum encryption level for the private keys
of certificates created using the certificate management profile. Selecting a larger key size will result in more
secure certificates. It may take a longer time to generate larger, more secure keys and to sign certificates with
larger keys. Certificate requests can include key sizes equal to or greater than the value configured here.
Key Size - Choose a minimum encryption level for the private keys of certificates created using the certificate
management profile. Selecting a larger key size will result in more secure certificates. It may take a longer time
to generate larger, more secure keys and to sign certificates with larger keys. Certificate requests can include
key sizes equal to or greater than the value configured here.
5. For certificate management profiles in which the "Approval by an Enrollment Administrator" option is selected
for the enrollment process and when the selected enrollment method is Server or via SCEP, in the Notification
Emails area, select the Notification Emails to send for certificate requests and certificate request rejections. All
configured automatic emails that can be used for certificate request and certificate request rejection notifications
will be available for selection. For more information about automatic emails, refer to “Configure Automatic
Emails” on page 35.
6. Additional form parameters can be used to associate data stored in the OpenTrust PKI with certificates and,
in the case of the Validity Duration form parameter, add content to certificates. To add a form parameter to a
certificate management profile:
b. Select an Element to use as a form parameter. There are several types of elements:
• Administrator's Email and Contact Email Address values are associated with the certificates generated by
the certificate management profile.
• Custom Fields and Phone Number values are associated with certificates generated by the certificate
management profile only if a metadata type is selected. If metadata type is not selected, the information is
entered during the certificate request and then discarded by the OpenTrust PKI.
• Validity Duration values are added to the certificate as content. If validity duration is configured as a
form parameter for the certificate management profile on the General tab, when someone requests
a certificate from the certificate management profile, the validity duration will be configurable by the
certificate requester and/or the administrator. The validity duration for the certificate will be the earliest/
shortest of: the date/time entered when requesting the certificate, the date/time configured on the General
tab, or the date/time of the signing CA's certificate expiration.
• Optional - An administrator or a certificate requester may choose to enter the information when
requesting a certificate.
• Mandatory - An administrator or a certificate requester must enter the information or accept the default
value when requesting a certificate or approving a certificate request.
• Static - The default value is always used to populate the certificate request form and cannot be edited.
d. To make the form parameter editable during the certificate request and/or certificate approval process,
when the requirement type is not set to Static, select "Editable by the Requester" and/or "Editable by the
Enrollment Administrator."
e. To associate form parameter metadata with certificates so that the metadata will be included in certificate
audit logs and available as search criteria when searching for certificates, select a metadata type. All
configured metadata types, as described in “Configure Metadata Types” on page 29, will be available
for selection. A metadata type cannot be associated with a form parameter if it is already associated with
another form parameter, a Subject Alternative Name, a Subject DN component, or a Microsoft certificate
template.
f. Configure a default value for the form parameter. If the form parameter is configured to be static, the
default value must be configured and is then pre-populated and uneditable in certificate request forms. If
the form parameter is not configured to be static and a datasource is not associated with the certificate
management profile, the default value is optional when configuring the form parameter and an entered
value will be used to pre-populate certificate request forms. If the form parameter is not configured to be
static and a datasource is associated with the certificate management profile, the default value is optional
when configuring the form parameter and can contain text and datasource values that will be used to pre-
populate certificate request forms. To configure the default value using a datasource value, drag and drop a
datasource field to the default value area.
7. Administrators can be sent reminder emails for pending certificate requests. To configure certificate request
reminder emails:
b. From the list of available automatic emails, select an automatic email. The list will contain all automatic
emails that can be used for certificate request reminders, configured as described in “Configure Automatic
Emails” on page 35.
c. Enter the number of days before the certificate request expiration to send the reminder email.
• Deletion of Pending Certificate Requests (in days) - Enter the number of days after a certificate request is
made and remains unapproved that the certificate request should be deleted from the list of pending certificate
requests.
• Email Sent on Certificate Request Expiration - To send a notification email when a certificate request
expires, from the list of available automatic emails, select an automatic email. The list will contain all automatic
emails that can be used for certificate request expiration notifications, configured as described in “Configure
Automatic Emails” on page 35.
9. Click Save. If configuring a new certificate management profile, continue to “Configure Renewal
Options” on page 47.
1. Log in to the user interface for an OpenTrust PKI RA component as an administrator with the Profiles
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. On the Renewal tab, select the renewal approval methods to support in the certificate management profile:
• Renewal with Enrollment Approval Method - This method is always selected and not configurable. It is
always possible to renew certificates using the same approval method selected for certificate enrollment. If
selected, the renewal with enrollment approval method results in a renewal process that is identical to the
original certificate request and enrollment processes. Renewal approval using the enrollment method can be
performed for any certificate holder who holds at least one certificate, currently in its renewal period, that was
generated using the certificate management profile. The renewal requester can change the information for the
renewed certificate by entering values in the certificate renewal request form fields that differ from the values
entered in the original certificate request form fields.
• Renewal with Automatic Approval - This method is only available for the decentralized, centralized, and
SCEP enrollment processes: This method is always selected and not configurable for SCEP enrollment
processes, for which renewed certificates are delivered via SCEP. If selected, the renewal with automatic
approval method results in the following renewal process: A certificate holder authenticates on the EE with the
certificate eligible for renewal and requests renewal for the certificate. Then a new certificate is delivered to the
renewal requester via email for decentralized, server, and centralized/"deliver by email" enrollment processes
and via a page in the EE user interface for centralized/"deliver by page in the EE user interface" enrollment
processes. The renewed certificate will be identical to the previous certificate, except for a new key pair.
If both renewal approval methods are selected, the renewal requester chooses the renewal method during the
certificate renewal request process.
4. To configure the renewal period for certificates generated using the certificate management profile, at the
Renewal Period (in days) prompt, enter the number of days before the certificate expiration date that the
certificate can be renewed. If 0 is entered, the certificates generated using the certificate management profile
are never eligible for renewal. A certificate that is eligible for renewal provides its holder with the ability to have
one more certificate than allowed by the "Maximum Number of Certificates per Holder (0 Means No Limit)" option
described in “Configure the General Settings” on page 38.
5. To notify certificate holders whose certificates are nearing expiration that their certificates are eligible for renewal,
in the Notification Emails area, click Add More and select an automatic email to use for the renewal eligibility
notification. All configured automatic emails that can be used for renewal notifications will be available for
selection. For more information about automatic emails, refer to “Configure Automatic Emails” on page 35.
Then enter the number of days before the certificate expiration date that the renewal notification email should be
sent. Repeat this step to configure multiple renewal notification reminder emails.
6. To continue sending renewal emails to certificate holders who hold a certificate that is not nearing its expiration
date, select Send Renewal Emails Even If a Valid Certificate Exists. This option is not selected by default to
prevent unnecessary emails in the event that a certificate has been renewed and the original certificate has not
yet expired. This option can be useful for holders of multiple certificates for the certificate management profile
because their certificates may have different expiration dates.
7. Click Save. If configuring a new certificate management profile, continue to “Configure Key Pair Recovery
Options” on page 48.
1. Log in to the user interface for an OpenTrust PKI RA component as an administrator with the Profiles
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. On the Recovery tab, select the recovery processes to support in the certificate management profile:
• Recovery Requested by the Holder - This recovery process is always selected and cannot be de-selected.
It is always possible for a certificate holder to make a certificate recovery request for a certificate that was
generated by a certificate management profile that is accessible on the EE. To email a recovered certificate
to the certificate holder, select an automatic email to use to deliver the recovered certificate. All configured
automatic emails that can be used to deliver recovered certificates for the holder will be available for selection.
For more information about automatic emails, refer to “Configure Automatic Emails” on page 35.
The recovery requested by the holder process is as follows: A recovery requester logs on to the EE or
a recovery administrator logs on to the RA and requests recovery for the certificate. Then the certificate
recovery request is approved by an administrator or is automatically approved when the request is made by an
administrator on the RA and the recovered certificate and private keys are delivered via email, the certificate
recovery request is denied by an administrator and a notification email is sent, or the certificate recovery
request expires and a notification email is sent.
• Recovery Requested for a Third-party - This recovery process can be modified even if certificates are
associated with the certificate management profile. To email a recovered certificate to the third-party, select
an automatic email to use to deliver the recovered certificate. All configured automatic emails that can be
used to deliver recovered certificates to third-parties will be available for selection. For more information
about automatic emails, refer to “Configure Automatic Emails” on page 35. Choose whether to require
authentication on the EE when requesting recovery for a third-party certificate. If EE authentication is not
required for third-party recovery requests but the certificate management profile is accessible on the EE,
anyone can request a third-party certificate recovery. If EE authentication is required for third-party recovery
requests and the certificate management profile is accessible on the EE, only authenticated certificate holders
can request third-party certificate key pair recoveries.
If selected, the recovery requested for a third-party process is as follows: A recovery requester logs on to the
EE and requests recovery of a certificate for a third party, not for the original holder of the certificate, to be
recovered. Then the certificate recovery request is approved by an administrator and the recovered certificate
and private keys are delivered via email, the certificate recovery request is denied by an administrator and a
notification email is sent, or the certificate recovery request expires and a notification email is sent.
If both recovery processes are selected, a certificate can be recovered by the holder and third-parties.
4. In the Notification Emails area, select the Notification Emails to send for certificate recovery requests and
certificate recovery request rejections. All configured automatic emails that can be used for certificate recovery
request and certificate recovery request rejection notifications will be available for selection. For more information
about automatic emails, refer to “Configure Automatic Emails” on page 35.
5. To remind administrators that there is a pending certificate recovery request, click Add More and select an
automatic email to use for the pending recovery request reminder. All configured automatic emails that can
be used for pending recovery request reminders will be available for selection. For more information about
automatic emails, refer to “Configure Automatic Emails” on page 35. Then enter the number of days before
the recovery request expiration date that the reminder email should be sent. Repeat this step to configure
multiple recovery request reminder emails.
• Deletion of Pending Certificate Recovery Requests (in days) - Enter the number of days after a certificate
recovery request is made and remains unapproved that the certificate recovery request should be deleted from
the list of pending certificate recovery requests.
• Email Sent on Certificate Recovery Request Expiration - To send a notification email when a certificate
recovery request expires, from the list of available automatic emails, select an automatic email. The list
will contain all automatic emails that can be used for certificate recovery request expiration notifications,
configured as described in “Configure Automatic Emails” on page 35.
7. Click Save. If configuring a new certificate management profile, continue to “Configure Revocation
Options” on page 49.
1. Log in to the user interface for an OpenTrust PKI RA component as an administrator with the Profiles
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. On the Revocation tab, select the revocation processes to support in the certificate management profile:
• Revocation by a Revocation Administrator - This recovery process is always selected and cannot be de-
selected. It is always possible for a certificate holder to make a certificate revocation request for a certificate
that was generated by a certificate management profile that is accessible on the EE. The revocation by a
revocation administrator process is as follows: A certificate holder accesses the EE and requests revocation
for the certificate. Then the certificate revocation request is approved by an administrator on the RA, the
certificate revocation request is denied by an administrator on the RA, or the certificate revocation request
expires. It is also possible for a revocation administrator to start the revocation by a revocation administrator
process on the RA without receiving a request made by a certificate holder on the EE.
• Self-revocation - This revocation process selection can be modified even if certificates are associated with
the certificate management profile. If selected, the self-revocation process is as follows: A certificate holder
authenticates on the EE, using either the certificate to be revoked or a revocation code and unique identifier
combination, and requests revocation for a certificate. Then the certificate is revoked.
Batch revocation is always enabled on the RA for all certificate management profiles, does not require a
revocation request, and does not need to be configured.
4. In the Notification Emails area, select the Notification Emails to send for certificate revocation requests,
certificate revocation request rejections, and certificate revocation notifications. All configured automatic emails
that can be used for certificate revocation request, certificate revocation request rejection, and certificate
revocation notifications will be available for selection. For more information about automatic emails, refer to
“Configure Automatic Emails” on page 35.
5. To remind administrators that there is a pending certificate revocation request, click Add More and select an
automatic email to use for the pending revocation request reminder. All configured automatic emails that can
be used for pending revocation request reminders will be available for selection. For more information about
automatic emails, refer to “Configure Automatic Emails” on page 35. Then enter the number of days before
the revocation request expiration date that the reminder email should be sent. Repeat this step to configure
multiple revocation request reminder emails.
• Deletion of Pending Certificate Revocation Requests (in days) - Enter the number of days after a
certificate revocation request is made and remains unapproved that the certificate revocation request should
be deleted from the list of pending certificate revocation requests.
• Email Sent on Certificate Revocation Request Expiration - To send a notification email when a certificate
revocation request expires, from the list of available automatic emails, select an automatic email. The list
will contain all automatic emails that can be used for certificate revocation request expiration notifications,
configured as described in “Configure Automatic Emails” on page 35.
7. Click Save. If configuring a new certificate management profile, continue to “Configure Certificate Extension
Requirements” on page 50.
1. Log in to the user interface for an OpenTrust PKI RA component as an administrator with the Profiles
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. On the Certificate Extensions tab, configure the certificate extensions to include in certificates generated using
the certificate management profile. Certificate extension configurations can be modified even if certificates are
associated with the certificate management profile. Certificate extensions are not required to be configured for
certificate management profiles.
• Key Usage - Select any quantity and combination of key usages to be included in the "X509v3 Key Usage"
section of the certificate. Choose whether to make the key usages critical or non-critical. The criticality setting
is applied to all selected key usages and cannot be applied to individual key usages.
• Extended Key Usage - Select any quantity and combination of key usages to be included in the "X509v3
Extended Key Usage" section of the certificate. Choose whether to make the key usages critical or non-critical.
The criticality setting is applied to all selected key usages and cannot be applied to individual key usages.
To add a custom extended key usage extension to the list of extended key usage extensions available for
selection, click "Add New Custom Key Usage," enter a valid description and OID for the custom extended key
usage extension, and click Add.
• Subject Alternative Names - Select the Subject Alternative Name types to be included in the "X509v3
Subject Alternative Name" section of certificates created using the certificate management profile. The
OpenTrust PKI will generate a Subject Alternative Name for the certificate based on the Subject Alternative
Name type selected and values entered when requesting a certificate. Use the Add More and delete signs to
add and remove Subject Alternative Names from the list. For each selected Subject Alternative Name:
◦ Optional - An administrator or a certificate requester may choose to enter the information when
requesting a certificate.
◦ Mandatory - An administrator or a certificate requester must enter the information or accept the default
value when requesting a certificate or approving a certificate request.
◦ Static - The default value is always used to populate the certificate request form and cannot be edited.
2. To make the value for the Subject Alternative Name editable during the certificate request and/or
certificate approval process, when the requirement type is not set to Static, select "Editable by the
Requester" and/or "Editable by the Enrollment Administrator."
3. To associate Subject Alternative Name metadata with certificates so that the metadata will be included in
certificate audit logs and available as search criteria when searching for certificates, select a metadata
type. All configured metadata types, as described in “Configure Metadata Types” on page 29, will
be available for selection. A metadata type cannot be associated with a Subject Alternative Name if it is
already associated with a form parameter, a subject DN component, or a Microsoft certificate template.
4. If "Alternative Name (DNS)" was selected, specify whether the wildcard character * is allowed in the
Alternative Name.
5. Configure a default value for the Subject Alternative Name. If the Subject Alternative Name is configured
to be static, the default value must be configured and is then pre-populated and uneditable in certificate
request forms. If the Subject Alternative Name is not configured to be static and a datasource is not
associated with the certificate management profile, the default value is optional when configuring the
Subject Alternative Name and an entered value will be used to pre-populate certificate request forms.
If the Subject Alternative Name is not configured to be static and a datasource is associated with the
certificate management profile, the default value is optional when configuring the Subject Alternative
Name and can contain text and datasource values that will be used to pre-populate certificate request
forms.
• CRL Distribution Point - CRL distribution points are locations from which CRLs can be obtained. To include a
CRL distribution point in the "X509v3 CRL Distribution Points" section of the certificate, enter a URI from which
the CRL of the CA signing the certificate can be downloaded. Use the Add More and delete signs to add and
remove CRL distribution points from the list.
• Authority Information Access - Authority information access extensions contain information about how
to access information and services, such as online validation services and CA certificates, for the CA that
creates the certificate in which the extension appears. To include an authority information access extension in
the "Authority Information Access" section of the certificate, select the method to use to access the authority
information:
◦ OCSP Service - Select this option when revocation information for the certificate in which this extension will
be included can be obtained using an OCSP responder integrated with the OpenTrust PKI. If this option is
selected, for the address, enter the URI of the OCSP service for the OCSP responder. To include more than
one URI for an OCSP service in the extension, click Add More and select the OCSP service option again.
◦ Authority Certificate - Select this option to include a URI from which to obtain the certificate of the CA
being used to sign the certificate in which the extension will be included. The certificate for the CA being
used to sign the certificate can be used to help certificate users select a certification path that terminates at
a point trusted by the certificate user. If this option is selected, for the address, enter the URI from which the
CA certificate can be obtained in the form of a DER file. To include multiple CA certificate addresses in the
authority information access extension, when the CA certificate can be obtained from more than one URI,
click Add More and select the authority certificate option again.
Use the Add More and delete signs to add and remove authority information access extensions from the list.
• Certificate Policies - Certificate policies extensions contain information about the policy used to create a
certificate. Certificate policy extensions are comprised of one or more policy information terms, each of which
consists of an object identifier (OID) and optional qualifiers. In a CA certificate, policy information terms limit
the set of policies for certification paths that include the certificate. In an end entity certificate, these policy
information terms indicate the policy under which the certificate has been issued and the purposes for which
the certificate may be used. To add a certificate policy extension to the "X509v3 Certificate Policies" section of
the certificate, enter any meaningful value for the Policy Identifier OID. The OpenTrust PKI supports the Struct
and Address qualifiers for certificate policies extensions. If a supported qualifier should also be added to the
certificate extension, choose a qualifier and configure the options for the qualifier:
◦ Address - To include, in the certificate, the URI of a Certification Practice Statement (CPS) published by the
signing CA, select Address and enter the URI from which the CPS can be downloaded.
◦ Struct - To include general information about the certificate policy being used to create the certificate, enter
information in any of the optional fields:
▫ Organization - Enter the name of the organization that created the certificate policy. If this option is
configured, Notice Numbers must also be configured.
▫ Notice Numbers - Enter a number associated with the certificate policy. To enter more than one number
associated with the policy, separate the numbers with commas. If this option is configured, Organization
must also be configured.
Use the Add More and delete signs to add and remove certificate policies extensions from the list
• Key Identifiers:
◦ Subject Key Identifier - Subject key identifiers are used to identify certificates that contain a common
public key used by an application. To include a non-critical subject-key-identifier certificate extension in
the "X509v3 Subject Key Identifier" section of the certificate, select the "Include a Subject Key Identifier
in certificates created with this certificate management profile" option. To create the certificate without a
subject-key-identifier certificate extension, de-select the "Include a Subject Key Identifier in certificates
created with this certificate management profile" option.
◦ Authority Key Identifier - Authority key identifiers are used to identify the public key that corresponds to the
private key used to sign a certificate. To include a non-critical authority-key-identifier certificate extension in
the "X509v3 Authority Key Identifier" section of the certificate, select Signing CA's SKI, which will generate a
unique authority key identifier for the signing CA's public key. Use of the Signing CA's SKI option is strongly
recommended for all certificates. Administrators can select Signing CA's Serial Number and Issuer DN
to add the Signing CA's Serial Number and Issuer DN to the authority key identifier. To prevent future
interoperability issues, use of the Signing CA's Serial Number and Issuer DN option is not recommended. To
create the certificate without an authority-key-identifier certificate extension, de-select the Signing CA's SKI
and Signing CA's Serial Number and Issuer DN options.
• Basic Constraints - Basic constraints are used to identify whether the subject of a certificate is a CA and to
specify the maximum number of non-self-issued intermediate CA certificates that may follow a certificate in
valid certification paths. To specify the maximum number of non-self-issued intermediate CA certificates that
may follow the CA certificate being created, in valid certification paths, select a Certification Path Length. The
basic constraints will be listed in the "X509v3 Basic Constraints" section of the certificate.
• Qualified Certificate Statements - To include qualified certificate statements in the "qcStatements" section of
the certificate: Select any of the available option-less ETSI qualified certificate statements. Use the Add More
and delete signs to add and remove IETF qualified certificate statements from the list. For each selected IETF
qualified certificate statement: select a syntax and choose whether to enter a semantics identifier and add one
or more name registration authorities.
• Microsoft Certificate Template - To include a Microsoft certificate template extension in the "Certificate
Template Name" section of the certificate, select "Define the Microsoft Certificate Template Extension" and
then configure the options for the Microsoft certificate template:
◦ Optional - An administrator or a certificate requester may choose to enter the information when
requesting a certificate.
◦ Mandatory - An administrator or a certificate requester must enter the information or accept the default
value when requesting a certificate or approving a certificate request.
◦ Static - The default value is always used to populate the certificate request form and cannot be edited.
A mandatory or static Microsoft certificate template extension is listed in the "1.3.6.1.4.1.311.20.2" section
of the certificate. An optional Microsoft certificate template extension that is provided during enrollment is
listed in the "1.3.6.1.4.1.311.20.2" section of the certificate.
2. To make the value for the Microsoft certificate template editable during the certificate request and/
or certificate approval process, when the requirement type is not set to Static, select "Editable by the
Requester" and/or "Editable by the Enrollment Administrator."
3. To associate Microsoft certificate template metadata with certificates so that the metadata will be included
in certificate audit logs and available as search criteria when searching for certificates, select a metadata
type. All configured metadata types, as described in “Configure Metadata Types” on page 29, will be
available for selection. A metadata type cannot be associated with a Microsoft certificate template if it is
already associated with a form parameter, a Subject Alternative Name, a subject DN component, or a
Microsoft certificate template.
4. Configure a default value for the Microsoft certificate template. If the Microsoft certificate template is
configured to be static, the default value must be configured and is then pre-populated and uneditable
in certificate request forms. If the Microsoft certificate template is not configured to be static, the default
value is optional when configuring the Microsoft certificate template and an entered value will be used to
pre-populate certificate request forms.
• Netscape Certificate Type - Select any quantity and combination of Netscape certificate types to be included
in the "Netscape Cert Type" section of the certificate. Choose whether to make the Netscape certificate types
critical or non-critical. The criticality setting is applied to all selected Netscape certificate types and cannot be
applied to individual Netscape certificate types.
• Netscape Comment - To include a comment in the "Netscape Comment" section of the certificate, enter text
in the free-form text field.
4. Click Save. If configuring a new certificate management profile, continue to “Configure Subject DN
Components” on page 52.
1. Log in to the user interface for an OpenTrust PKI RA component as an administrator with the Profiles
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. On the Subject DN tab, select the DN components to be included in the DN of the certificates created using the
certificate management profile. Use the Add More and delete signs to add and remove DN components from the
list. At least one subject DN component must be configured. Subject DN components can be modified even if
certificates are associated with the certificate management profile.
To use the Organization Identifier as a subject DN component, the add-on eIDAS .rpm must be applied. Contact
an assigned IDnomic technical representative for more information.
• Optional - An administrator or a certificate requester may choose to enter the information when
requesting a certificate.
• Mandatory - An administrator or a certificate requester must enter the information or accept the default
value when requesting a certificate or approving a certificate request.
• Static - The default value is always used to populate the certificate request form and cannot be edited.
b. To make the value for the DN component editable during the certificate request and/or certificate approval
process, when the requirement type is not set to Static, select "Editable by the Requester" and/or "Editable
by the Enrollment Administrator."
c. To associate subject DN component metadata with certificates so that the metadata will be included in
certificate audit logs and available as search criteria when searching for certificates, select a metadata type.
All configured metadata types, as described in “Configure Metadata Types” on page 29, will be available
for selection. A metadata type cannot be associated with a subject DN component if it is already associated
with a form parameter, a Subject Alternative Name, a subject DN component, or a Microsoft certificate
template.
d. Configure a default value for the subject DN component. If the subject DN component is configured to be
static, the default value must be configured and is then pre-populated and uneditable in certificate request
forms. If the subject DN component is not configured to be static and a datasource is not associated with the
certificate management profile, the default value is optional when configuring the subject DN component and
an entered value will be used to pre-populate certificate request forms. If the subject DN component is not
configured to be static and a datasource is associated with the certificate management profile, the default
value is optional when configuring the subject DN component and can contain text and datasource values
that will be used to pre-populate certificate request forms.
5. Click Save. If configuring a new certificate management profile, the certificate management profile can now be
used to enroll certificates.
Note: In environments where the OpenTrust PKI RA component is not hosted on the same server
as the OpenTrust PKI EE component, certificate management profiles, zones, and browser profiles
configured on the RA component are synchronized periodically. To make certificate management
profiles, zones, and browser profiles configured on the RA component immediately available on the EE,
see “Synchronize RA Configuration” on page 68.
1. Log in to the user interface for an OpenTrust PKI RA component as an administrator with the Profiles
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
4. Click Export.
1. Log in to the user interface for an OpenTrust PKI RA component as an administrator with the Profiles
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. On the Settings Import page, select a method to access the text file containing the certificate management profile
component configurations, with a .txt extension.
• Local Path - If the file containing the certificate management profile component configurations has been
copied to a directory on the machine where the browser being used to perform these steps is installed, enter or
browse to and select the directory path and file name of the file containing the certificate management profile
component configurations.
• URL - If the file containing the certificate management profile component configurations is accessible from a
server location, enter the fully-qualified domain name, file path, and file name in the form of a URL such as
https://fqdnofserverhostingexportedconfigs/exportedconfigfiles/settings.txt.
5. On the Select the Elements to Import page, for each certificate management profile component configuration
contained in the text file, select or deselect the following options:
• Import - If selected, the certificate management profile component configuration will be imported
• Exists - If selected, an existing certificate management profile component configuration of the same name will
be overwritten with the configuration stored in the text file being used for import.
Note: If importing component configurations that were previously exported, the import will overwrite any
configuration changes that have been made since the configurations were exported.
6. Click Import.
7. View the "Profile import completed. Please verify that profiles are coherent with the platform (missing
dependencies may have been removed)." success message.
The CA, RA, and EE components of the OpenTrust PKI have configurable module settings, as described in:
1. Log in to the user interface for an OpenTrust PKI CA component as an administrator with the Configuration right.
If the initial administration certificate has not yet been deleted, an administrator using the initial administration
certificate can also perform this task.
3. On the Certificate Authority page, configure the settings for the Certificate Authority component or confirm that
the default configurations are appropriate for the production environment:
• Administrator's Email - The administrator's email was originally configured in the "Initialize the Application
Modules" section of the OpenTrust PKI Server Installation and Upgrade Guide. Enter a "from" address
for email that will be sent to administrators who receive email notifications from the OpenTrust PKI server
application, such as CA administrators who are notified when internal certificates for the OpenTrust PKI
components are about to expire. Each OpenTrust PKI component (CA, RA, EE, or Logs) can use a unique
administrator's email address. This email address is used only for emails sent from the OpenTrust PKI
server application through Apache and not for cron event emails that are sent to the email address that was
configured when running the installer. The administrator's email for the CA component is also used for the
CA Administrator option in the "To:" drop-down menu for some of the email templates described in Configure
Automatic Emails.
• Enforce Size to CRT Parameters of RSA Keys - This option can be used to accommodate smart cards that
require CRT (Chinese Remainder Theorem) calculations to be performed during the OpenTrust PKI's RSA-
based keys generation process. This option should only be used in consultation with an assigned IDnomic
technical representative.
4. Click Save.
5. View the "The configuration has been successfully updated." success message.
1. Log in to the user interface for an OpenTrust PKI RA component as an administrator with the Configuration right.
If the initial administration certificate has not yet been deleted, an administrator using the initial administration
certificate can also perform this task.
3. On the Registration Authority page, configure the settings for the Registration Authority component or confirm
that the default configurations are appropriate for the production environment:
• Administrator's Email - The administrator's email was originally configured in the "Initialize the Application
Modules" section of the OpenTrust PKI Server Installation and Upgrade Guide. Enter a "from" address
for email that will be sent to administrators who receive email notifications from the OpenTrust PKI server
application, such as revocation request notifications. . Each OpenTrust PKI component (CA, RA, EE, or Logs)
can use a unique administrator's email address. This email address is used only for emails sent from the
OpenTrust PKI server application through Apache and not for cron event emails that are sent to the email
address that was configured when running the installer. The administrator's email for the RA component is also
used for the RA Administrator option in the "To:" drop-down menu for some of the email templates described in
Configure Email Templates.
• Search Entries Limit - Enter the maximum number of search results that can be returned when an
administrator searches for a certificate on the RA component by navigating to Registration Authority |
Enrollment | Search for a Certificate. If the number of certificates meeting the search criteria is greater than
the number of search results allowed by this setting, there will not be a warning for the administrator. If a
specific certificate is not listed in the search results, the administrator can use more search criteria to narrow
the search results.
4. Click Save.
5. View the "The configuration has been successfully updated." success message.
1. Log in to the user interface for an OpenTrust PKI RA component as an administrator with the Configuration right.
If the initial administration certificate has not yet been deleted, an administrator using the initial administration
certificate can also perform this task.
3. On the Publication page, configure the settings for the Publication module or confirm that the default
configurations are appropriate for the production environment:
• Administrator's Email - The administrator's email was originally configured in the "Initialize the Application
Modules" section of the OpenTrust PKI Server Installation and Upgrade Guide. Enter a "from" address
for email that will be sent to administrators who receive email notifications from the OpenTrust PKI server
application, such as publication error notifications. Each OpenTrust PKI component (CA, RA, EE, or Logs)
can use a unique administrator's email address. This email address is used only for emails sent from the
OpenTrust PKI server application through Apache and not for cron event emails that are sent to the email
address that was configured when running the installer. The administrator's email for the Publishing module
is also used for the Publish Administrator option in the "To:" drop-down menu for some of the email templates
described in Configure Email Templates.
• Number of Publication Attempts - Enter the number of retries the OpenTrust PKI should make to publish
CRLs and certificates when there is a publication failure.
• Initial Delay - Enter the number of seconds after which the OpenTrust PKI should start re-trying to publish
CRLs and certificates when there is a publication failure.
• Delay Law Used - Select a sequence to determine the delay times between the publication retries that occur
after the initial re-attempt.
4. To view the schedule for the publication retries based on the configurations for Number of Publication Attempts,
Initial Delay, and Delay Law Used, click Preview.
5. Click Save.
1. Log in to the user interface for an OpenTrust PKI RA component as an administrator with the Configuration right.
If the initial administration certificate has not yet been deleted, an administrator using the initial administration
certificate can also perform this task.
3. On the Auto-enrollment Proxy page, choose to Add a New Forest Mapping or to Modify or Remove an existing
forest mapping.
4. If the choice is to create a new forest mapping, enter a name for the Active Directory forest for which certificate
templates will be mapped to OpenTrust PKI certificate management profiles.
5. If creating a new forest mapping or modifying an existing forest mapping, to map the Microsoft Certificate
Templates to the OpenTrust PKI Certificate Management Profiles in the "Microsoft Certificate Templates -
OpenTrust PKI Certificate Management Profiles Associations" row:
a. In the drop-down menus, select a Microsoft Certificate Template Name and a corresponding OpenTrust
PKI Certificate Management Profile Name.
b. To enable Common Name mapping between the Active Directory and the CN configured for the Subject DN
of the selected certificate management profile, in the "Active Directory attribute mapping" sub-row, select
Enable and enter the Active Directory attribute that should be used for the Common Name.
Use the plus and minus symbols to add additional mappings or remove configured mappings. The OpenTrust
PKI Certificate Management Profile Name drop-down menu will be populated with certificate management
profiles that have been configured for the OpenTrust PKI, as described in “Configure Certificate Management
Profiles” on page 21, and can be used with the AEP; for example, certificate management profiles that are used
to generate and enroll decentralized certificates will be available in the OpenTrust PKI Certificate Management
Profile Name drop-down menu but certificate management profiles that are used to generate and enroll
centralized certificates will not be available for selection because decentralized certificates are more appropriate
for servers in an Active Directory forest. The Microsoft Certificate Template Name drop-down menu will be
populated with all of the Microsoft Certificate Templates available in the Active Directory forest.
6. Click Save.
7. View the "The forest has been successfully saved." success message.
1. Log in to the user interface for an OpenTrust PKI EE component as an administrator with the Configuration right.
If the initial administration certificate has not yet been deleted, an administrator using the initial administration
certificate can also perform this task.
3. On the Enrollment Entity page, configure the settings for the Enrollment Entity component or confirm that the
default configurations are appropriate for the production environment:
• Administrator's Email - The administrator's email was originally configured in the "Initialize the Application
Modules" section of the OpenTrust PKI Server Installation and Upgrade Guide. Enter a "from" address for
email that will be sent to recipients who receive notifications from the OpenTrust PKI server application,
such as notifications sent to certificate holders whose enrollment requests have been pre-approved. Each
OpenTrust PKI component (CA, RA, EE, or Logs) can use a unique administrator's email address. This email
address is used only for emails sent from the OpenTrust PKI server application through Apache and not for
cron event emails that are sent to the email address that was configured when running the installer. The
administrator's email for the EE component is also used for the EE Administrator option in the "To:" drop-down
menu for some of the email templates described in Configure Email Templates.
• Search Entries Limit - Enter the maximum number of search results that can be returned when an
administrator searches for a certificate on the EE component by navigating to Enrollment Entity | Enrollment |
Search for a Certificate. If the number of certificates meeting the search criteria is greater than the number of
search results allowed by this setting, there will not be a warning for the administrator. If a specific certificate is
not listed in the search results, the administrator can use more search criteria to narrow the search results.
• Enrollment Procedure - This option will not be configurable unless a custom enrollment procedure has
been designed for the OpenTrust PKI. For more information about custom enrollment procedures, contact an
assigned IDnomic technical representative.
• Browser Profile - Select the browser usage policy to use for processes performed on the EE component
that require a browser usage policy but that are not governed by a certificate management profile configured
to use a specific browser usage policy, such as importing a CA certificate. The browser choices include the
default browser usage policy available for customization and use in certificate management profiles, the
non-customizable built-in browser usage policy, and any additional browser usage policies that have been
configured on the RA component, as described in “Configure Browser Usage ” on page 26. The selected
browser usage policy will be the browser usage policy used when "EE Browser Usage Policy" is selected as
the browser usage policy in a certificate management profile.
4. Click Save.
When the OpenTrust PKI server application is initialized, as described in the "Initialize the Server Application" section
of the OpenTrust PKI 4.12 Server Installation and Upgrade Guide, the certificates required for the OpenTrust PKI's
internal modules are signed. Internal certificates are known as internal certificates because the certificates are for the
internal modules of the OpenTrust PKI. Internal certificates, except the escrow certificate, must be renewed before they
expire. If any of the OpenTrust PKI's internal module certificates, except theescrow certificate, are missing or expired, the
OpenTrust PKI will not function correctly.
The certificates for the internal modules (except the escrow module) of all host servers should be renewed at the same
time by the same self-signed and trusted internal OpenTrust PKI CA. In multi-host environments, the CA signing the
internal module certificates must be trusted on all host servers. The internal module certificates for each host server can
be renewed in any order. Administrators will receive an email notification before internal module certificates are set to
expire; the email notification will be sent every day until the internal modules certificates due to expire are renewed or
expire. The sending start date for the notification email can be configured, as described in “Configure Email Notifications
for Internal Modules Certificates Expiration” on page 64.
1. Log in to the OpenTrust PKI as an administrator with the Server Management right. If the initial administration
certificate has not yet been deleted, an administrator using the initial administration certificate can also perform
this task.
2. Navigate to the Server Management | Trust & Internal Certificates | Internal Certificates Renewal page.
4. On the Internal Certificates Renewal tab, select a key size for each module that requires a signed certificate to
be renewed and click Create Keys and Certificate Requests for Internal Modules.
5. At the "Choose one of the following methods to sign the internal modules certificates request." prompt, select the
type of CA to use to sign the certificates for the internal modules and follow the corresponding instructions:
• Local CA - To sign the CSRs for the internal module certificates being renewed with a local CA, select Local
CA, Click Sign, select a CA from the list of CAs, click Next, and view the "Certificates have been successfully
imported." success message. This option will only be available when creating or renewing certificates on a
server hosting the OpenTrust PKI CA. Continue to Step 28 on page 61.
• External OpenTrust CA - In a multi-host installation of the OpenTrust PKI, to sign the CSRs for the internal
module certificates being renewed with an IDnomic CA that is not hosted on the server where the initialization
steps are currently being performed, select External IDnomic CA and continue to Step 6 on page 59.
• External Third-party CA - To sign the CSRs for the internal modules of the server being initialized with a non-
IDnomic CA, select External Third-party CA and continue to Step 21 on page 60.
6. Click Export.
7. On the Download File page, download the certificate signing request using one of the following methods:
8. If the internal module certificates for a host server other than the server hosting the CA are being renewed, leave
the user interface of the OpenTrust PKI host server on which the internal module certificates are being renewed
and log in to the user interface of an OpenTrust PKI CA as an administrator with CSR signing rights. If the initial
administration certificate has not yet been deleted, an administrator using the initial administration certificate can
also perform this task.
9. To import the certificate signing requests to the OpenTrust PKI's CA and obtain the required signatures, on the
OpenTrust PKI's CA, navigate to the Server Management | Trust & Internal Certificates | Remote IDnomic CSR
Signature page.
10. On the Remote IDnomic CSRs Signature page, select a method for importing the CSRs and enter the required
information:
• Local Path - If the .tgz file containing the CSRs has been copied to a directory on the machine where the
browser being used to access the OpenTrust PKI's CA and obtain the signatures is installed, enter or browse
to and select the directory path and file name for the .tgz file containing the CSRs.
• URL - If an OpenTrust PKI was used to create the CSRs and the Copy Link Location download method was
used to export the CSRs from the OpenTrust PKI component being initialized, right-click to paste the URL
location of the .tgz file containing the CSRs.
12. On the File Hash Details page, from the list of CAs that have been created on the CA component being used to
sign the CSRs, select a trusted CA to use to sign the certificates being renewed for the OpenTrust PKI internal
modules. In multi-host environments, the same internal trusted CA should be selected each time the process is
repeated for the internal module certificates for each host server.
14. On the Download File page, download the signed certificates using one of the following methods:
15. Return to the user interface of the OpenTrust PKI host server on which the internal module certificates are being
renewed and navigate to the Server Management | Trust & Internal Certificates | Internal Certificates Renewal
page's Internal Certificates Renewal tab.
16. At the "Choose one of the following methods to sign the internal modules certificates request." prompt, select
External IDnomic CA and click Import.
17. On the Internal Modules Certificate page, select a method for importing the signed certificates and enter the
required information:
• Local Path - If the .tgz file containing the signed certificates has been copied to a directory on the machine
where the browser being used to complete the initialization for the OpenTrust PKI component is installed, enter
or browse to and select the directory path and file name for the .tgz file containing the signed certificates.
• URL - If an OpenTrust PKI CA was used to sign the CSRs and the Copy Link Location download method was
used to export the signed certificates from the OpenTrust PKI CA, right-click to paste the URL location of the
.tgz file containing the signed certificates.
19. On the File Hash Details page, click Import the Certificates.
21. Select a method to use to export the CSRs and follow the corresponding instructions:
• To export all of the CSRs, for all of the modules that need signed certificates, in a .tgz file, click Export.
• To export the CSRs for each module individually, In the Request column for the first module that has green
check mark to indicate a CSR needs to be signed, where a mouse over the icon displays an, "Export the
certificate request..." message, click the icon. On the Download File page, click the Download Link and Save
the .p10 file. Return to the Server Management | Trust & Internal Certificates | Internal Certificates Renewal
page. Select External Third-party CA and repeat this process until a .p10 file has been downloaded for each
module that needs a signed certificate to be renewed.
22. Leave the OpenTrust PKI component's user interface to import the certificate signing requests to the non-
IDnomic PKI's CA and obtain the required signatures.
23. Once the signature requests have been signed and a signed certificate file is available for each module, return to
the user interface of the OpenTrust PKI host server on which the internal module certificates are being renewed
and navigate to the Server Management | Trust & Internal Certificates | Internal Certificates Renewal page's
Internal Certificates Renewal tab and select External Third-party CA.
24. In the Certificate column for the first module that has red warning triangle to indicate a signed CSR needs to be
imported, where a mouse over the icon displays an, "Import the certificate signed by..." message, click the icon.
25. On the Internal Modules Certificates page, select a method for importing the signed certificate for the module
requested and enter the required information:
• Local Path - If the certificate file containing the signed certificates has been copied to a directory on the
machine where the browser being used to complete the initialization for the OpenTrust PKI component is
installed, enter or browse to and select the directory path and file name for the certificate file containing the
signed certificate.
• URL - If an OpenTrust PKI CA was used to sign the CSRs and the Copy Link Location download method was
used to export the signed certificates from the OpenTrust PKI CA, right-click to paste the URL location of the
certificate file containing the signed certificate.
27. Return to the Server Management | Trust & Internal Certificates | Internal Certificates Renewal page's Internal
Certificates Renewal tab and select External Third-party CA. Repeat Step 24 to Step 26 until a certificate file
has been uploaded for each module that needs a signed certificate.
This section describes how to use the server administration tools provided in the OpenTrust PKI user interface. The
server administration tools allow administrators to:
More information on some of these topics can be found in the OpenTrust PKI System Maintenance Guide.
To restart the OpenTrust PKI server application via the user interface:
1. Log in to the OpenTrust PKI application as an administrator with the System Management right. If the initial
administration certificate has not yet been deleted, an administrator using the initial administration certificate can
also perform this task.
4. Click Restart.
5. When the "Restarting OpenTrust PKI" pop-up closes, view the "OpenTrust PKI has been successfully restarted."
success message.
To restart the OpenTrust PKI services using the options provided in the user interface:
1. Log in to the OpenTrust PKI application as an administrator with the System Management right. If the initial
administration certificate has not yet been deleted, an administrator using the initial administration certificate can
also perform this task.
3. On the Restart Services page, in the Service row, select an individual service to restart:
• etc - to register cron tasks on the host operating system's cron service
• httpd - to restart the Web server hosting the OpenTrust PKI server application (and all Web contexts)
• db - to restart the OpenTrust PKI server application's database (when using an embedded PostgreSQL server
database)
• transd - to restart the module that manages communication between the OpenTrust PKI modules; this service
cannot be restarted from the server hosting the OpenTrust PKI EE component when the EE component is not
hosted on a server hosting other OpenTrust PKI components
• ocsp - to restart the Online Certificate Status Protocol module; this service can only be restarted from the
server hosting the OpenTrust PKI RA component
• snmpd - to restart the service that manages the snmp-subagent service (if SNMP monitoring is enabled)
• snmp-subagent - to restart the service responsible for SNMP monitoring (if SNMP monitoring is enabled)
4. Click Restart.
5. When the "Restarting Service" pop-up closes, view the "servicename has been successfully restarted."
success message where "servicename is the name of the service that was restarted.
1. Log in to the user interface for the OpenTrust PKI server application as an administrator with the Server
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
2. Navigate to the Server Management | Trust & Internal Certificates | Internal Certificates Expiration page.
• Recipient Email Address - Enter the email address of the administrator that will receive the notifications.
• Internal Certificates Expiration Reminder (Days) - Enter the number of days in advance of the expiration
date that an email should be sent to the administrator at the email address configured in the Recipient Email
Address field, warning the administrator about the pending expiration date and the need to renew the internal
modules certificates, as described in “Renew Internal Certificates” on page 59. The email notification will be
sent every day until the internal modules certificates due to expire are renewed or expire.
1. Log in to the OpenTrust PKI as an administrator with the System Management right. If the initial administration
certificate has not yet been deleted, an administrator using the initial administration certificate can also perform
this task.
3. On the Syslog Output page, select one or more types of events to send to syslog:
4. Click Save.
To direct syslog events to a particular directory on the machine hosting the OpenTrust PKI server
application:
1. Log in to the OpenTrust PKI server application as an administrator with the System Management right. If
the initial administration certificate has not yet been deleted, an administrator using the initial administration
certificate can also perform this task.
3. On the Syslog Output page, choose a Facility from the drop-down menu. To determine which directory on
the machine hosting the OpenTrust PKI server application corresponds to each facility, review the syslog
configuration file. By default, the syslog configuration file is the etc/syslog.conf file on RHEL and the /etc/
syslog-ng/syslog-ng.conf file on SLES.
4. Click Save.
1. Log in to the OpenTrust PKI application as an administrator with the System Management right. If the initial
administration certificate has not yet been deleted, an administrator using the initial administration certificate can
also perform this task.
3. On the Syslog Output page, in the area under the "Choose the events to send to syslog. If none are selected, all
of the events will be sent to syslog." message, select the events to be reported to syslog.
4. Click Save.
1. Log in to the OpenTrust PKI server application as an administrator with the System Management right. If
the initial administration certificate has not yet been deleted, an administrator using the initial administration
certificate can also perform this task.
4. Click Save.
5. View the "The settings have been successfully modified." success message.
To set the date and time format that will be displayed in the UI:
1. Log in to the OpenTrust PKI server application as an administrator with the System Management right. If
the initial administration certificate has not yet been deleted, an administrator using the initial administration
certificate can also perform this task.
• UTC - will display the Coordinated Universal Time date and time
• Server Time Zone - will the display the date and time of the time zone in which the server is hosted
4. Click Save.
5. View the "The settings have been successfully modified." success message.
To allow the OpenTrust PKI server application to be trusted by the reverse proxy Web server, the certificate chain for the
OpenTrust PKI server application can be imported to the reverse proxy Web server.
To see a configuration example for an Apache Web server using a reverse proxy to communicate with OpenTrust PKI,
see “Configure Apache as a Reverse Proxy Server With OpenTrust PKI” on page 85.
1. Log in to the OpenTrust PKI application as an administrator with the System Management right. If the initial
administration certificate has not yet been deleted, an administrator using the initial administration certificate can
also perform this task.
2. Navigate to the Server Management | System Configuration | Reverse Proxy Compatibility page.
3. On the Reverse Proxy Compatibility page, select Enable Reverse Proxy Compatibility.
4. In the Type drop-down menu, select the type of reverse proxy to use:
• Bee-Ware 4000 - The client certificate should be Base64 encoded, without spaces or characters that indicate
new lines.
• Cookie - The reverse proxy Web server will store the certificate for the OpenTrust PKI client application in a
cookie.
• HTTP Header - The reverse proxy Web server will store the certificate for the OpenTrust PKI client application
in HTTP headers set by the reverse proxy Web server.
6. Enter the name of the cookie or HTTP header in which the certificate for the OpenTrust PKI client application
will be stored.
7. To configure a password to use to authenticate the reverse proxy Web server to the OpenTrust PKI server
application, select the Use Shared Secret checkbox and configure the password:
a. Enter the name of the cookie or HTTP header in which the shared secret will be stored.
8. Click Save.
9. When the "Restarting httpd service" pop-up closes, view the "The following services have been successfully
restarted: httpd" success message.
To configure the log consolidation interval for audit logs or the event consolidation intervals for reporting:
1. Log in to the user interface for the OpenTrust PKI server application as an administrator with the System
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. On the Scheduled Jobs page, configure the available consolidation interval options:
• Audit Logs Consolidation Interval (in minutes) - Enter the number of minutes after which the logs recorded
in the log queue should be consolidated and moved to the audit logs database tables so that they can be
viewed in the Audit Logs user interface. If the OpenTrust PKI log component is not hosted on the same host
server where the configuration is being made, the logs are consolidated and sent to the OpenTrust PKI log
component with the entered frequency.
• Internal Certificates Status Check - Select the frequency with which to check the validity status of internal
certificates. This option is only available in the UI for the server hosting the CA component.
4. Click Save.
5. When the "Please restart etc service to take the modifications into account." prompt is displayed, restart the etc
service using the instructions in “Restart Services” on page 63.
1. If the user interface being accessed to generate the diagnostic file using the IDnomic Support Tool is associated
with an OpenTrust PKI component hosted on a SLES operating system, while logged in to the host server with
permissions to open and edit the /etc/sudoers file, open the /etc/sudoers file and, if the file does not
already contain the following lines, add the following lines to the file:
Defaults:pki !requiretty
pki ALL = NOPASSWD: /opt/opentrust/ost/sbin/opentrust-support-tool
2. Log in to the user interface for the OpenTrust PKI server application as an administrator with the System
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. Navigate to the Server Management | System Management | IDnomic Support Tool page.
4. On the IDnomic Support Tool page, to generate the diagnostic file provided by the IDnomic Support Tool, click
Generate Diagnostic File.
6. Send the diagnostic file to an assigned IDnomic technical representative for evaluation.
1. Log in to the user interface for the OpenTrust PKI server application as an administrator with the System
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
• “Configure the SNMP Dashboard” on page 70 - to configure the built-in SNMP dashboard
• “Use the SNMP Dashboard” on page 71 - to use the built-in SNMP dashboard
Administrators can enable SNMP monitoring to use the IDnomic snmpd service or to use a host operating system
SNMP daemon. If administrators choose to use the IDnomic snmpd service, the host machines to be monitored are
automatically detected and can be selected for monitoring in the SNMP dashboard settings, as described in “Configure
the SNMP Dashboard” on page 70. If administrators choose to use a host operating system SNMP daemon and
intend to use the IDnomic SNMP dashboard, after enabling SNMP monitoring, administrators must configure connections
to the host servers that will be monitored, as described in “Configure the SNMP Dashboard” on page 70. If upgrading
from a version earlier than 4.8, an internal certificate must have been created for the snmp-monitoring module, as
described in the "Upgrade Server Application, Add New Components or Features, or Change System Settings on RHEL/
CentOS or SLES" section of the Server Installation and Upgrade Guide.
1. Log in to the user interface for the OpenTrust PKI server application as an administrator with the System
Configuration right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. To enable SNMP monitoring on the host server, select the SNMP Monitoring checkbox.
4. To download the IDnomic MIB for use by an SNMP client, click Click Here to Download IDnomic MIB.
5. Choose the SNMP service to be used to manage the OpenTrust PKI snmp-subagent service:
• OpenTrust PKI-managed SNMP Service - The OpenTrust PKI snmp-subagent service will be
managed by the OpenTrust PKI server application's snmpd service, which can be restarted via the user
interface in the same way as the other OpenTrust PKI server application services described in “Restart
Services” on page 63. this selection allows the host server to be selected for inclusion the SNMP
dashboard without needing additional configuration.
• System SNMP Service - The OpenTrust PKI snmp-subagent service will be managed by the host operating
system's SNMP daemon, which cannot be restarted via the user interface in the same way as the other
OpenTrust PKI server application services described in “Restart Services” on page 63. This selection
requires additional configuration when the host server is selected for inclusion the SNMP dashboard, as
described in “Configure the SNMP Dashboard” on page 70.
6. If the OpenTrust PKI snmp-subagent service will be managed by the OpenTrust PKI snmpd service, continue
to Step 7 on page 69. If the OpenTrust PKI snmp-subagent service will be managed by the host operating
system's SNMP service, in the UNIX Socket (agentXSocket) field, enter the named pipe where the OpenTrust
PKI snmp-subagent service should listen for the master file, for example: agentxsocket /var/agentx/
master
7. If the OpenTrust PKI snmp-subagent service will be managed by the host operating system's SNMP daemon,
skip this step. To use the OpenTrust PKI server application's snmpd service to manage the OpenTrust PKI
snmp-subagent service, configure the following fields:
b. Name (sysName) - Enter an identifying name for the host server on which the snmpd service is being
configured.
c. Description (sysDescr) - Enter a description of the host server on which the snmpd service is being
configured.
d. Location (sysLocation) - Enter the location of the host server for the snmpd service.
e. Contact (sysContact) - Enter the email address of the administrator who should receive notifications
regarding the snmpd service on the host server.
f. Version - Select the version of the SNMP protocol to be used by the snmpd service and configure the
corresponding fields:
8. To configure the disk space monitoring to be performed via SNMP by listing the mount points to be monitored
and the alert threshold for each mount point:
The entered mount points and thresholds will be added to the /opt/opentrust/pki/etc/
snmpd.confdaemon configuration file. This file cannot be edited and is regenerated each time the daemon is
started.
a. Select the certificate expiration alert threshold. The selected threshold will be applied to all of the
certificates monitored by SNMP. The certificates monitored by SNMP include the internal certificates of
the OpenTrust PKI server application, the certificates for all internal CAs of the OpenTrust PKI server
application, and the certificates of all registered external CAs.
b. Select the CRL expiration alert threshold. The selected threshold will be applied to all of the CRLs
monitored by SNMP. The CRLs monitored by SNMP include the CRLs of the internal and registered external
CAs for the OpenTrust PKI server application that have an associated CRL.
10. To allow authorized servers to connect to the SNMP monitoring module, in the Authorized DNs field,
click Add More to enter the DNs of the certificates for the servers to be granted access. The machine
to be monitored must be configured to trust the DN of the SNMP internal certificate of the server
performing the SNMP monitoring. The CN of the DN of the certificate performing the monitoring is
server_performing_the_SNMP_monitoring_product_abbreviation]-snmp. For example, if an
OpenTrust PKI machine is trying to monitor an IDnomic CMS machine, the DN to be trusted on the CMS will
contain CN=pki-snmp. The rest of the DN is BaseDN.
11. To save the configuration, add the OpenTrust PKI snmp-subagent service to the list of OpenTrust PKI server
application services available for restart as described in “Restart Services” on page 63, and make the
host server available to be configured in the built-in SNMP dashboard as described in “Configure the SNMP
Dashboard” on page 70, click Save.
12. On the "Do you want to activate/deactivate monitoring services with the new configuration?" pop-up, choose OK
to start the OpenTrust PKI snmp-subagent service and the snmpd service if it was selected to manage the
snmp-subagent service or Cancel to leave the OpenTrust PKI snmp-subagent service and the snmpd service
unstarted.
1. Log in to the user interface for the OpenTrust PKI's RA server application as an administrator with the System
Configuration right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. On the Dashboard Settings page, select the host servers to be monitored by the SNMP daemon. To be available
for selection, SNMP monitoring must be configured on the host server, as described in “Configure SNMP
Monitoring” on page 69.
4. If the IDnomic snmpd service is being used for SNMP monitoring, continue to Step 5 on page 71. If a host
operating system SNMP daemon is being used for SNMP monitoring, configure the SNMP options used to
access the host operating system SNMP daemon on each of the host servers that has been selected to be
monitored:
a. SNMP Port - Enter the port that should be used to access the host operating system SNMP daemon.
b. Version - Select the version of the SNMP protocol being used by the host operating system SNMP daemon
and configure the corresponding fields:
5. Click Save. The configuration can be saved if the OpenTrust PKI snmp-subagent service has been started for
the selected host servers.
1. Log in to the user interface for the OpenTrust PKI's RA server application as an administrator with the System
Management right. If the initial administration certificate has not yet been deleted, an administrator using the
initial administration certificate can also perform this task.
3. On the Dashboard page, to view the system overview summary or to see more detailed monitoring information
for a particular host machine, select the corresponding tab.
4. On the Dashboard page, to go to the configuration page for a monitored item, select the corresponding link.
Detailed information about the audit log events and the audit logs in general can be found in the OpenTrust PKI Audit
Logs Guide. This section describes how to use the Audit Logs section of the OpenTrust PKI server application user
interface. In the Audit Logs user interface, administrators can:
1. Log in to the OpenTrust PKI server application as an administrator with the Audit Log right. If the initial
administration certificate has not yet been deleted, an administrator using the initial administration certificate can
also perform this task.
3. On the Logs Search page, accept the default search interval to view the recorded logs for the day or select an
interval in the drop-down menu.
5. Click Search.
• In the returned search results, to view more details for an audit log entry, click in the log entry row to expand
the log entry. To view further details, in the expanded log entry view, click View Log Details.
• To initiate a new search using a tracker associated with one or more log entries, mouse over the tracker icon
associated with the log entry and select a tracker. A tracker is a highlighted search criterion that facilitates
searches for log entries with common content, such as a PIN policy or the serial number associated with a
smart card.
• To navigate through the search results quickly, use the following keyboard shortcuts:
◦ Space - Navigate from an expanded log entry view to an expanded view of the next log entry
◦ Backspace - Navigate from an expanded log entry view to an expanded view of the previous log entry
◦ V - Navigate from an expanded log entry view to the Log Entry Details page for a log
◦ B - Navigate from the Log Entry Details page for a log back to the search results list with an expanded view
of the log entry
1. Log in to the OpenTrust PKI server application as an administrator with the Audit Log right. If the initial
administration certificate has not yet been deleted, an administrator using the initial administration certificate can
also perform this task.
2. Navigate to the Audit Logs | Logs | Search Using Unique Identifier page.
3. On the Search Using Unique Identifier page, use the identifier type drop-down menu to select the type of unique
identifier to use in the search criteria:
• Error Unique Identifier - To enter the unique identifier displayed in an error message.
• Log Identifier - To enter the unique identifier associated with a log entry, as displayed on the Log Entry Details
page in the General Information section.
5. Click Search.
2. On the Logs Search page, select one of the download options and follow the associated instructions:
• To download selected log entries in a .csv file, click Other Actions | Download in CSV. In the Download
in CSV pop-up menu, select the log entry details to include in the .csv file and then click Download. The
configuration of the details selected for download to a .csv file can be saved for re-use. Saved .csv download
configurations will be displayed to and can be used by all administrators with the Audit Log right.
• To download all of the log entries in an .xml file, click Other Actions | Download in XML.
• To download an individual log entry in an .xml file, follow the instructions in “Search for Log
Entries” on page 73. Then, to display the Log Entry Details page for an individual log entry, click View Log
Details in the row associated with the log entry. On the Log Entry Details page, click Download XML Entry.
2. Then, to display the Log Entry Details page for an individual log entry, click View Log Details in the row
associated with the log entry.
3. On the Log Entry Details page, view the signature status for the log entry:
• Wrong Signature - The signature for the log is invalid. This might be because the XML version of the log
has been modified or because the certificate used to sign the log entry does not match the expected signing
certificate.
3. On the Save Request pop-up, enter a Name and Description for the search configuration.
4. Click OK.
5. To verify that a request was saved or to view previously saved searches, click the Requests tab. On the Request
tab, saved searches can be run, copied, or deleted using the icons in the row for the saved search.
2. In the returned search results, to expand the view for an audit log entry, click in the log entry row. In the
expanded log entry view, click View Log Details.
4. On the "Send by Email" pop-up, enter the email address of the recipient and click OK. Separate multiple email
addresses with commas.
The OpenTrust PKI includes automated scripts that may be helpful to administrators. To view the list of automated
scripts, administrators can log in to the server hosting an OpenTrust PKI component and change to the /opt/
opentrust/pki/sbin directory. To change to the /opt/opentrust/pki/sbin directory and view the list of
available automated scripts, enter:
cd /opt/opentrust/pki/sbin
ls
To learn more about the automated scripts, administrators can use the --help option available for each automated
script. The --help option for each script provides information about what the script does and how to use the script.
For example, to find out more about the pki-diag script, an administrator can enter:
/opt/opentrust/pki/sbin/pki-diag --help
Administrators need to configure access rights to manage administrator access to the various parts of the OpenTrust PKI
server application user interface and manage the rights granted to certificate lifecycle administrators to perform certificate
lifecycle management process tasks.
Zones are created on the RA component. Zone configuration is limited to the RA component unless a certificate
management profile is configured with the Certificate Request Right Required option selected on the Enrollment tab.
When the Certificate Request Right Required option is selected on the Enrollment tab of a certificate management
profile, administrators with the Execute right for the certificate management profile on the EE can edit the rights for
the Request Certificate on the EE process in the zones with which the certificate management profile is associated
on the EE. To make zones and their associated certificate management profiles available to the EE administrator
who configures the rights for the OpenTrust PKI EE component, an EE administrator must log in to the EE user
interface, navigate to Settings | Modules Settings | Enrollment Entity and click Synchronize RA Configuration. The
certificate management profiles are then available in the EE user interface on the Rights on Zones and Profiles tab when
configuring rights for users or groups, as described in “Configure Rights” on page 81.
1. Log in to the OpenTrust PKI RA server application as an administrator with the Zone Management right. If
the initial administration certificate has not yet been deleted, an administrator using the initial administration
certificate can also perform this task.
3. On the List of Zones page, choose to Create a New Zone or to Modify, Copy, or Remove an existing zone.
Note: A zone cannot be removed if an active certificate is associated with in the zone.
4. If the choice is to modify the zone configuration, continue to Step 5 on page 80. If the choice is to create a
new zone, on the Create a New Zone page:
a. Enter a Name and Description for the zone. The name and description will be visible in other parts of
the user interface, for example, when selecting which zone to use as the default zone for a certificate
management profile. To make it easier to select the correct zone in other parts of the user interface, provide
detailed information in the name and description fields.
b. Enter the Title values for the zone. The title will be used to display the zone in other parts of the user
interface. Providing detailed information in the title fields will make it easier to select the correct zone in
other parts of the user interface. The default title will be displayed in the user interface when language-
specific titles have not been configured or when the language used by a certificate requester or certificate
holder is not included in the list of configured language-specific titles. When language-specific titles have
been configured, the language-specific titles will be displayed for configured languages that correspond
to the language used by a certificate requester or certificate holder as set in the Web browser being used
to access the OpenTrust PKI. It is possible to configure titles for any language. To configure titles in an
additional language, use the Add More button, enter a two-letter abbreviation for the language in the drop-
down menu, and enter the language-specific title in the text field.
c. To select the certificate management profiles to associate with the zone, select the checkboxes next to
the certificate management profile names. All configured certificate management profiles will be available for
selection. To help with selecting and deselecting multiple certificate management profiles, toggle the Select
All Profiles/Deselect All Profiles button.
d. Click Save.
5. On the Edit Zone page, make any necessary changes to the zone description and the certificate management
profiles selected for association with the zone.
6. Click Save.
A group can be configured only on the OpenTrust PKI component host server on which the group was created.
1. Log in to the OpenTrust PKI server application as an administrator with the Group management right. If the initial
administration certificate has not yet been deleted, an administrator using the initial administration certificate can
also perform this task.
3. On the List of Groups page, choose to Create a New Group or to Modify, Copy, or Remove an existing group.
4. If the choice is to modify the configuration for a group, continue to Step 5 on page 80. If the choice is to create
a new group, on the Create a New Group page:
a. Enter a Name and Description for the group. The name and description will be visible in other parts of the
user interface, for example, when selecting which groups should be associated with specific rights. To make
it easier to select the correct group in other parts of the user interface, provide detailed information in the
name and description fields.
b. Click Save.
5. On the Edit Group page, on the Managers tab, manage the list of users and groups with the right to add and
remove members of this group. To add users or groups, click Add New Group Managers.
a. On the Search for Managers pop-up, to search for a group or user DN to grant the right to add and remove
members of this group, enter a value in any of the available search fields. The wildcard character '*' will
return all results that exist for the search criterion.
b. Click Search.
c. To add a search result to the list of users and groups with the right to add and remove members of this
group, close the Search for Managers pop-up, and return to the Edit Group page, select the search result.
d. In the row for the user or group in the list of users and groups with the right to add and remove members of
this group:
• To grant the user or group the right to add and remove members of this group, select the checkbox in the
Execute column.
• To grant the user or group the ability to grant the right to add and remove members of this group to other
users and groups, in the Grant Ability column:
◦ Select Execute if the user or group can give others the right to add and remove members.
◦ Select Execute & Grant to Others if the user of group can give others the right to add and remove
members and give others the right to grant the right to others.
• Use the trash can icon to Remove the user or group from the list of users and groups with the right to add
and remove members of this group.
e. Click Save.
6. On the Members tab, view the users and groups who are member of this group. No configuration can be made
on the Members tab; it is view-only.
1. Log in to the OpenTrust PKI server application as an administrator with a Grant Ability for at least one right.
If the initial administration certificate has not yet been deleted, an administrator using the initial administration
certificate can also perform this task.
3. On the Rights Management page, to search for a group or user to edit or display, enter a value in any of the
available search fields and click Search. The wildcard character '*' will return all results that exist for the search
criterion.
4. To configure the rights for a user or group returned in the search results, select the search result.
5. On the Edit Rights page, on the Group Membership tab, to make the user or group being edited a member of an
available group, select or deselect the group. The user or group being edited will be a member of all selected
groups.
• To grant the user or group access rights for OpenTrust PKI server application functionalities by module, select
the checkbox in the Execute column. A description of each right appears under the name of the right in the
user interface.
• To grant the user or group the ability to grant the right to others, in the Grant Ability column:
◦ Select Execute if the user or group can give others the right to execute the right.
◦ Select Execute & Grant to Others if the user of group can give others the right to execute the right and give
others the right to grant the right to others.
7. On the Zones & Profiles tab, to configure the user or group rights on certificate management profiles by zone, in
the Zone drop-down menu, select a Zone. The certificate management profiles that have been associated with
the zone, as described in “Configure Zones” on page 79, will be displayed.
8. For each certificate management profile displayed in the list, to expand the certificate management profile and
view the rights option for the certificate management profile, click the Certificate Management Profile: name.
9. For each certificate lifecycle management process displayed for a certificate management profile, in the row for a
specific right:
• To grant the user or group the rights for tasks associated with the certificate lifecycle management processes
configured for the certificate management profile, select the checkbox in the Execute column. A description of
each right appears under the name of the right in the user interface.
• To grant the user or group the ability to grant the right to others, in the Grant Ability column:
◦ Select Execute if the user or group can give others the right to execute the right.
◦ Select Execute & Grant to Others if the user of group can give others the right to execute the right and give
others the right to grant the right to others.
• To apply the rights and grant ability options selected for one certificate management profile to all of the other
certificate management profiles in the zone, click the "Apply all these rights on all profiles of this zone" icon.
To view the rights that have been assigned for a module, zone, or certificate management profile on one of
the OpenTrust PKI components:
1. Log in to the user interface for the OpenTrust PKI component as an administrator with the Rights audit right or
with Grant Ability rights for a zone or certificate management profile. If the initial administration certificate has not
yet been deleted, an administrator using the initial administration certificate can also perform this task.
3. On the Rights Display page, choose to display the assigned rights for a module, zone, or certificate management
profile and follow the corresponding instructions:
• Zone: Leave the default of "Any Zone" or select an available zone. Then select a corresponding certificate
management profile for the zone.
• Certificate Management Profile: Select an available certificate management profile. Then select a
corresponding zone for the certificate management profile.
4. Click Display.
• DNname - String must be composed of "PrintableString" characters, that is ASCII letters and numbers
(ABCDEGHIJKLMNOPQRSTUVWXYZ, abcdeghijklmnopqrstuvwxyz, 0123456789), the characters '()+-.:?, and the
space character.
• dnsComponent - String must be composed of ASCII letters, numbers and the "-" character ("hyphen", ASCII code
0x2D).
• dnsName - DNS fully qualified domain name. To comply with RFC 3280, the "preferred name syntax" is used, as
3
described in RFC 1034 , paragraph 3.5.
4
• email - String must be a valid email address, as defined in RFC 5322 .
• utf8 - String must be composed of a valid UTF8 alphanumerical character, or a common symbol: °'"()|-_.:?!/&,=@[];
{}€$£~^¨µ§æ«þßðđħĸł»¢“”·<>`%*+#
1
http://www.ietf.org/rfc/rfc3280.txt
2
http://www.freesoft.org/CIE/RFC/Orig/rfc1738.txt
3
http://tools.ietf.org/html/rfc1034
4
https://tools.ietf.org/html/rfc5322
5
http://support.microsoft.com/?scid=kb%3Ben-us%3B899663
Important: Improper use of this functionality may have negative impact on the security of the application.
<VirtualHost *:443>
SSLEngine on
SSLVerifyDepth 10
# Server certificate
# - CN must match ServerName
# - subjectAltName with the URI of the server, e.g. https://<ServerName>
SSLCertificateFile /etc/httpd/mycert.crt
SSLCertificateKeyFile /etc/httpd/mycert.key
SSLProxyEngine on
SSLProxyVerify none
ProxyPass / https://my.actual.pki.example.com/
ProxyPassReverse / https://my.actual.pki.example.com/
# Headers configuration
# Logging
CustomLog "logs/rp__access_log" common
ErrorLog "logs/rp__error_log"
LogLevel info
#LogLevel debug
</VirtualHost>
The following example script describes a cron job that fetches CRLs from the OpenTrust PKI, checks for errors, and
checks whether CRLs need to be updated.
#!/bin/bash
echo "!!!!!!!!!"
echo "EDIT this file to suit your needs"
echo "!!!!!!!!!"
exit 1
pkihost=my.actual.pki.example.com
crlbundle=/etc/httpd/crl-bundle.pem
httppidfile=/var/run/httpd/httpd.pid
tempcrlbundle=/tmp/crl-bundle.pem
logfile=/tmp/logfile-$$
if [ ! -s "$tempcrlbundle" ]; then
echo "crl file is empty"
unlink ${logfile}
exit 1
fi
unlink ${logfile}
# not running
test -r ${httppidfile}|| exit 0
pid=$(cat ${httppidfile})
test -d /proc/$pid || exit 0