Setting up Certificate-Based Enrollment
387
One way to achieve this is to initialize hardware tokens in bulk and preload them with dual
certificates issued by the Certificate System for dual key pairs. These certificates are generated with
generic common names, such as
hardwaretoken1234
. This way, there is no one-to-one relation
between users and the hardware tokens initially. Once the tokens are ready, they are given to the
users. A user can get and use any preinitialized and certificate-loaded hardware token.
Next, all users use the randomly-picked token to enroll for a pair of certificates that have a subject
name derived from their LDAP attribute values; the certificates are issued for the existing key pairs
preloaded into the token, but now the key pairs are associated with the user's identity.
• Users need to use the signing certificate already in their possession to get an encryption certificate.
For example, single certificates for single key pairs have already been issued to users. A client
application is deployed that is capable of generating dual key pairs. Now, users can use their signing
certificates as authentication tokens to request another certificate to use for encrypting data.
16.5.1. Setting up Certificate-Based Enrollment
To set up certificate-based enrollment:
1. Customize the enrollment form to use.
2. Enable the appropriate enrollment option, such as directory-based enrollment or certificate-based
enrollment. Configure the authentication module to compose the desired DN pattern.
3. Three enrollment forms are provided for the certificate-based enrollment:
•
CertBasedDualEnroll.html
This form enables end users to request dual certificates, one
for signing another for encryption, by submitting preissued certificates as authentication tokens;
when a user enrolls for a certificate, the server verifies the CA that has issued the certificate
used for authentication, uses the configured directory to formulate subject names for the new
certificates, and issues the certificates.
•
CertBasedEncryptionEnroll.html
This form is provided as a sample. It enables end
users to request encryption certificates by submitting preissued certificates as authentication
tokens; when a user enrolls for a certificate, the server verifies the CA that has issued the
certificate used for authentication, uses the configured directory to formulate the subject name
for the new certificate, and issues the certificate.
•
CertBasedSingleEnroll.html
This form is provided as a sample. It enables end users
to request signing certificates by submitting preissued certificates as authentication tokens;
when a user enrolls for a certificate, the server verifies the CA that has issued the certificate
used for authentication, uses the configured directory to formulate the subject name for the new
certificate, and issues the certificate.
Enabling certificate-based enrollment creates one link, named
Certificate
, under
the list of certificate profiles in the end-entities page. By default, the link points to
the
CertBasedDualEnroll.html
form. To use either of the other two forms,
CertBasedEncryptionEnroll.html
or
CertBasedSingleEnroll.html
, associate the
Certificate
link to the form or add more links to the
index.html
file.
Summary of Contents for CERTIFICATE SYSTEM 7.3 - ADMINISTRATION
Page 15: ...xv Index 525 ...
Page 16: ...xvi ...
Page 38: ...Chapter 1 Overview 16 Figure 1 4 Certificate System Architecture ...
Page 82: ...Chapter 2 Installation and Configuration 60 rpm ev rhpki manage ...
Page 154: ...132 ...
Page 194: ...172 ...
Page 238: ...216 ...
Page 244: ...222 ...
Page 246: ...224 ...
Page 286: ...264 ...
Page 292: ...270 ...
Page 318: ...Chapter 13 Certificate Profiles 296 Parameter IssuerType_n IssuerName_n ...
Page 321: ...Freshest CRL Extension Default 299 Parameter PointName_n PointIssuerName_n ...
Page 398: ...376 ...
Page 412: ...390 ...
Page 472: ...450 ...
Page 506: ...484 ...
Page 528: ...506 ...
Page 546: ...524 ...