
IT Environment Assumptions
Appendix B
Common Criteria Environment: Setup and Operations
691
Password and Certificate Storage
Plan for the storage of any passwords and certificates. Also plan your user password policy.
Make sure everyone knows and adheres to these policies.
Hardware Token
This environment requires a FIPS 140-1 level 3 certified hardware cryptographic module.
You need to install the software and hardware for this hardware token before installing and
configuring the subsystems. You will also setup the hardware token for use with CS after
installing CS, but before installing a subsystem. Use the hardware token to create subsystem
certificates during installation of each subsystem.
Protection of Private and Secret Keys
CS certificate private keys and secret keys are to be generated and stored in a FIPS 140-1
level 3 certified hardware cryptographic token.
The CS private (asymmetric) keys are:
•
Private key associated with the CA signing certificate.
•
Private key associated with the RA-to-CA SSL client certificate.
•
Private key associated with the OCSP Responder signing certificate.
•
Private key associated with the CA-to-DRM SSL client certificate.
•
Private key associated with the DRM transport certificate.
•
Private key associated with the CA, RA, DRM, and OCSP SSL server certificates.
•
Private key associated with the audit log signing certificate.
•
Private key associated with the DRM storage certificate used for encrypting user
subject encryption private keys (for DRM key archival).
The CS secret (symmetric) key is:
•
Symmetric key used to encrypt passwords for password cache (single-sign-on). See
“Password Cache,” on page 245.
Note: CS does not store user secret keys, and it does not support the export of component
(subsystem) private or secret keys.
Summary of Contents for CERTIFICATE 7.1 ADMINISTRATOR
Page 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Page 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...