SubjectAltNameExt Plug-in Module
Chapter
4
Certificate Extension Plug-in Modules
233
Attributes in a certificate request are filled in by servlets from the HTTP input
forms used for request submission. Some attributes, such as passwords typed in
the form are not stored in the request. Other attributes regarding the end entity,
such as the user ID, are set on the request after successful authentication. The
servlets can also set additional attributes related to the certificate content on the
request; for example, in automated-enrollment methods, some attributes may be
read from the authentication directory and set in the request as authenticated
attributes.
If you’re using any of the directory-based authentication methods, you can
configure Certificate Management System to retrieve values for any string and byte
attributes from the directory and set them in the certificate request during
authentication—you specify these attributes by entering them in the
ldapStringAttributes
and
ldapByteAttributes
fields defined in the automated
enrollment modules. For more information, see Table 1-2 on page 26, Table 1-3 on
page 30, and Table 1-4 on page 38.
Note that all data related to an end entity is gathered at the servlet level and set on
the request before the request is passed to the policy subsystem.
In general, you can configure which attributes should or shouldn’t be stored in the
request; for example, you can exclude sensitive attributes such as passwords from
getting stored in the request with the help of the parameter named
dontSaveHttpParams
defined in the CMS configuration file. For details on using
this parameter, see the description for
HTTP_PARAMS
in section “JavaScript Used By
All Interfaces” of CMS Customization Guide. You can also distinguish the attributes
based on their origin—that is, whether they originated from the enrollment form or
where added to the request during the authentication process. Authenticated
attributes have
AUTH_TOKEN
as prefix (for example,
AUTH_TOKEN.mail
) and
non-authenticated attributes such as the ones that come from the HTTP input have
HTTP_PARAMS
as prefix (for example,
HTTP_PARAMS.csrRequestorEmail
).
If enabled, the subject alternative extension policy checks the certificate request for
configured attributes. If the request contains an attribute, the policy reads its value
and sets it in the extension. This way, the extension that gets to added to certificates
contains all the configured attributes.
During installation, Certificate Management System automatically creates an
instance of the subject alternative name extension policy. See “SubjectAltNameExt
Rule” on page 237.
Summary of Contents for Certificate Management System 6.0
Page 1: ...Plug Ins Guide Netscape Certificate Management System Version6 0 March 2002...
Page 10: ...10 Netscape Certificate Management System Plug Ins Guide March 2002...
Page 62: ...Enrollment Forms 62 Netscape Certificate Management System Plug Ins Guide March 2002...
Page 308: ...NTEventLog Plug in Module 308 Netscape Certificate Management System Plug Ins Guide March 2002...