Chapter 13. Certificate Profiles
286
b. Select
Authentication
in the left navigation tree.
c. In the
Authentication Instance
tab, click
Add
, and add an instance of the
UidPwdDirAuth
authentication plug-in.
d. Set the information for the LDAP directory.
e. Set the LDAP attributes to populate.
f.
Save the new plug-in instance.
For information on configuring the LDAP authentication modules, see
Section 16.3.1, “Setting up
Directory-Based Authentication”
.
2. When the new authentication plug-in is added, the corresponding parameters are added to the
CA's
CS.cfg
file. For example, this instance of the
UidPwdDirAuth
plug-in is set to populate the
attribute:
...
auths.instance.UserDirEnrollment.dnpattern=
auths.instance.UserDirEnrollment.ldapByteAttributes=
auths.instance.UserDirEnrollment.ldapStringAttributes=mail
auths.instance.UserDirEnrollment.pluginName=UidPwdDirAuth
auths.instance.UserDirEnrollment.ldap.basedn=dc=example,dc=com
auths.instance.UserDirEnrollment.ldap.maxConns=
auths.instance.UserDirEnrollment.ldap.minConns=
auths.instance.UserDirEnrollment.ldap.ldapconn.host=localhost
auths.instance.UserDirEnrollment.ldap.ldapconn.port=389
auths.instance.UserDirEnrollment.ldap.ldapconn.secureConn=false...
The
ldapStringAttributes
parameter instructs the authentication plug-in to read the value
of the
attribute from the user's LDAP entry and put that value in the certificate request.
When the value is in the request, the certificate profile policy can be set to insert that value for an
extension value.
3. To enable the CA to insert the LDAP attribute value in the certificate extension, edit the profile's
configuration file, and insert a policy set parameter for an extension. For example, to insert the
attribute value in the Subject Alternative Name extension in the caDirUser profile, do the
following:
cd /var/lib/rhpki-ca/profiles
vi caDirUser.cfg
policyset.setID.8.default.params.
subjAltExtPattern_0=$request.auth_token.mail[0]$
4. Restart the CA.
/etc/init.d/rhpki-ca restart
For this example, certificates submitted through the caDirUser profile enrollment form will have the
Subject Alternative Name extension added with the value of the requester's
LDAP attribute. For
example:
Summary of Contents for CERTIFICATE SYSTEM 7.3 - ADMINISTRATION
Page 15: ...xv Index 525 ...
Page 16: ...xvi ...
Page 38: ...Chapter 1 Overview 16 Figure 1 4 Certificate System Architecture ...
Page 82: ...Chapter 2 Installation and Configuration 60 rpm ev rhpki manage ...
Page 154: ...132 ...
Page 194: ...172 ...
Page 238: ...216 ...
Page 244: ...222 ...
Page 246: ...224 ...
Page 286: ...264 ...
Page 292: ...270 ...
Page 318: ...Chapter 13 Certificate Profiles 296 Parameter IssuerType_n IssuerName_n ...
Page 321: ...Freshest CRL Extension Default 299 Parameter PointName_n PointIssuerName_n ...
Page 398: ...376 ...
Page 412: ...390 ...
Page 472: ...450 ...
Page 506: ...484 ...
Page 528: ...506 ...
Page 546: ...524 ...