
Configuring the Certificate Manager
102
Red Hat Certificate System Administrator’s Guide • September 2005
f.
Paste the certificate chain into the text box.
Click Next to continue.
35.
Single Sign-on Summary.
Check the summary and select whether to retain or delete
the
password.conf
file. For details, see “Token Password Storage” on page 244.
Click Next to continue.
36.
Configuration Status.
This screen should indicate that your configuration has been
successful.
Click Done to exit the Installation Wizard.
37.
You now need to create the first
agent
user for the Certificate Manager. See “Agent
Certificates,” on page 324 for details.
Configuring the Certificate Manager
This section lists the areas that you can configure for the Certificate Manager, gives a
description of that area, and points you to specific information on configuring that set of
features.
Adding Users
Once the Certificate Manager is installed, you need to add users and assign them to the
administrator, agent, or auditor roles. If you selected the option to have the administrator
created during installation also act as an agent, then the administrator is your first agent. If
you did not, you need to create an agent user who can access the agent services interface.
See Chapter 9, “Authorization” for details on adding users and assigning them to groups.
Configuring Authorization
Each subsystem has a set of predefined roles that are assigned a default set of privileges.
You create users in the CS database and then assign them to a group to give them the
privileges of that group. The privileges assigned to a group are controlled by Access
Control Instructions (ACIs) placed in Access Control Lists (ACLs). ACLs define points that
need specific authorization. Generally, each defines a distinct set of functionality for the
server. ACIs define what operations can or cannot be performed by a user, group, or IP
address for that particular ACL. You can change the default ACIs set up in the ACLs to
Summary of Contents for CERTIFICATE 7.1 ADMINISTRATOR
Page 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Page 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...