Chapter 8.
183
Token Key Service
The Certificate System Token Management System consists of three components, the Token
Processing System (TPS), the Token Key Service (TKS), and the Enterprise Security Client. This
chapter explains the TKS, which manages the master keys required set up a secure communication
channel between the TPS and the client.
8.1. Overview
A TKS manages the master and transport keys required to generate and distribute keys for smart
cards or tokens. A master key is a Triple DES symmetric key stored either in software or hardware
token. When supplied with the token CUID, a TKS can generate the corresponding three secret keys
� authentication key, Mac key, and key encryption key (KEK) � on the tokens.
The Certificate System TPS subsystem uses the TKS subsystem to generate the token keys the TPS
uses to communicate with the Enterprise Security Client. The TPS communicates with the TKS over
SSL. The TKS provides the security between tokens and the TPS since the security relies on the
relationship between the master key and the token keys.
The functions provided by the TKS include the following:
• Helps establish a secure channel (signed and encrypted) between the token and TPS.
• Provides proof of presence for the security token during enrollment.
• Supports key changeover when the master key changes on the TKS. Tokens with older keys get
new token keys.
NOTE
Because of the sensitivity of the data that the TKS manages, the TKS should be set
behind the firewall with restricted access.
8.2. Using Master Keys
Generate new master and transport keys using the
tksTool
utility. The transport key is used to send
the master key securely to the facility where the tokens are generated. Tokens that are generated with
a particular master key can only be used with that master key.
1. Generate the new master key. For example:
tksTool -M -n new_master -d /var/lib/rhpki-tks/alias -h token_name
2. Create a transport key called
transport
.
tksTool -T -d . -n transport
3. When prompted, fill in the database password, then type in some noise to seed the random
number generator.
4. Use the transport key to generate and wrap a master key and store it in a file called
file
.
Summary of Contents for CERTIFICATE SYSTEM 7.2 - MIGRATION GUIDE
Page 36: ...Chapter 1 Overview 16 Figure 1 4 Certificate System Architecture ...
Page 144: ...124 ...
Page 160: ...140 ...
Page 208: ...188 ...
Page 210: ...190 ...
Page 256: ...236 ...
Page 282: ...Chapter 12 Certificate Profiles 262 Parameter IssuerName_n IssuerType_n ...
Page 285: ...Freshest CRL Extension Default 265 Parameter PointName_n PointIssuerName_n ...
Page 362: ...342 ...
Page 376: ...356 ...
Page 436: ...416 ...
Page 490: ...470 ...
Page 504: ...484 ...