Chapter 13. Certificate Profiles
272
requirements. A profile handles one certificate request, but a single request can contain information
for multiple certificates. A PKCS#10 request contains a single public key. One CRMF request can
contain multiple public keys, meaning multiple certificate requests. A profile may contain multiple sets
of policies, with each set specifying how to handle one certificate request within a CRMF request.
13.2. How Certificate Profiles Work
An administrator sets up a certificate profile by associating an existing authentication plug-in, or
method, with the certificate profile; enabling and configuring defaults and constraints; and defining
inputs and outputs. The administrator can use the existing certificate profiles, modify the existing
certificate profiles, create new certificate profiles, and delete any certificate profile that will not be used
in this PKI.
Once a certificate profile is set up, it appears on the
Manage Certificate Profiles
page of the agent
services page where an agent can approve, and thus enable, a certificate profile. Once the certificate
profile is enabled, it appears on the
Certificate Profile
tab of the end-entities page where end entities
can enroll for a certificate using the certificate profile.
The certificate profile enrollment page in the end-entities interface contains links to each certificate
profile that has been enabled by the agents. When an end entity selects one of those links, an
enrollment page appears containing an enrollment form specific to that certificate profile. The
enrollment page is dynamically generated from the inputs defined for the profile. If an authentication
plug-in is configured, additional fields may be added to authenticate the user.
When an end entity submits a certificate profile request that is associated with an agent-approved
(manual) enrollment, an enrollment where no authentication plug-in is configured, the certificate
request is queued in the agent services interface. The agent can change some aspects of the
enrollment, request, validate it, cancel it, reject it, update it, or approve it. The agent is able to update
the request without submitting it or validate that the request adheres to the profile's defaults and
constraints. This validation procedure is only for verification and does not result in the request being
submitted. The agent is bound by the constraints set; they cannot change the request in such a way
that a constraint is violated. The signed approval is immediately processed, and a certificate is issued.
When a certificate profile is associated with an authentication method, the request is approved
immediately and generates a certificate automatically if the user successfully authenticates, all the
information required is provided, and the request does not violate any of the constraints set up for the
certificate profile. There are profile policies which allow user-supplied settings like subject names or
validity periods. The certificate profile framework can also preserve user-defined content set in the
original certificate request in the issued certificate.
The issued certificate contains the content defined in the defaults for this certificate profile, such as
the extensions and validity period for the certificate. The content of the certificate is constrained by
the constraints set for each default. Multiple policies (defaults and constraints) can be set for one
profile, distinguishing each set by using the same value in the policy set ID. This is particularly useful
for dealing with dual keys enrollment where encryption keys and signing keys are submitted to the
same profile. The server evaluates each set with each request it receives. When a single certificate
is issued, one set is evaluated, and any other sets are ignored. When dual-key pairs are issued, the
first set is evaluated with the first certificate request, and the second set is evaluated with the second
certificate request. There is no need for more than one set for issuing a single certificate or more than
two sets for issuing dual-key pairs.
Summary of Contents for CERTIFICATE SYSTEM 7.3 - ADMINISTRATION
Page 15: ...xv Index 525 ...
Page 16: ...xvi ...
Page 38: ...Chapter 1 Overview 16 Figure 1 4 Certificate System Architecture ...
Page 82: ...Chapter 2 Installation and Configuration 60 rpm ev rhpki manage ...
Page 154: ...132 ...
Page 194: ...172 ...
Page 238: ...216 ...
Page 244: ...222 ...
Page 246: ...224 ...
Page 286: ...264 ...
Page 292: ...270 ...
Page 318: ...Chapter 13 Certificate Profiles 296 Parameter IssuerType_n IssuerName_n ...
Page 321: ...Freshest CRL Extension Default 299 Parameter PointName_n PointIssuerName_n ...
Page 398: ...376 ...
Page 412: ...390 ...
Page 472: ...450 ...
Page 506: ...484 ...
Page 528: ...506 ...
Page 546: ...524 ...