Setting up Certificate-Based Enrollment
387
One way to achieve this is to initialize hardware tokens in bulk and preload them with dual
certificates issued by the Certificate System for dual key pairs. These certificates are generated with
generic common names, such as
hardwaretoken1234
. This way, there is no one-to-one relation
between users and the hardware tokens initially. Once the tokens are ready, they are given to the
users. A user can get and use any preinitialized and certificate-loaded hardware token.
Next, all users use the randomly-picked token to enroll for a pair of certificates that have a subject
name derived from their LDAP attribute values; the certificates are issued for the existing key pairs
preloaded into the token, but now the key pairs are associated with the user's identity.
• Users need to use the signing certificate already in their possession to get an encryption certificate.
For example, single certificates for single key pairs have already been issued to users. A client
application is deployed that is capable of generating dual key pairs. Now, users can use their signing
certificates as authentication tokens to request another certificate to use for encrypting data.
16.5.1. Setting up Certificate-Based Enrollment
To set up certificate-based enrollment:
1. Customize the enrollment form to use.
2. Enable the appropriate enrollment option, such as directory-based enrollment or certificate-based
enrollment. Configure the authentication module to compose the desired DN pattern.
3. Three enrollment forms are provided for the certificate-based enrollment:
•
CertBasedDualEnroll.html
This form enables end users to request dual certificates, one
for signing another for encryption, by submitting preissued certificates as authentication tokens;
when a user enrolls for a certificate, the server verifies the CA that has issued the certificate
used for authentication, uses the configured directory to formulate subject names for the new
certificates, and issues the certificates.
•
CertBasedEncryptionEnroll.html
This form is provided as a sample. It enables end
users to request encryption certificates by submitting preissued certificates as authentication
tokens; when a user enrolls for a certificate, the server verifies the CA that has issued the
certificate used for authentication, uses the configured directory to formulate the subject name
for the new certificate, and issues the certificate.
•
CertBasedSingleEnroll.html
This form is provided as a sample. It enables end users
to request signing certificates by submitting preissued certificates as authentication tokens;
when a user enrolls for a certificate, the server verifies the CA that has issued the certificate
used for authentication, uses the configured directory to formulate the subject name for the new
certificate, and issues the certificate.
Enabling certificate-based enrollment creates one link, named
Certificate
, under
the list of certificate profiles in the end-entities page. By default, the link points to
the
CertBasedDualEnroll.html
form. To use either of the other two forms,
CertBasedEncryptionEnroll.html
or
CertBasedSingleEnroll.html
, associate the
Certificate
link to the form or add more links to the
index.html
file.
Содержание CERTIFICATE SYSTEM 7.3 - ADMINISTRATION
Страница 1: ...Red Hat Certificate System 7 3 Administration Guide Publication date May 2007 updated March 25 2010 ...
Страница 15: ...xv Index 525 ...
Страница 16: ...xvi ...
Страница 38: ...Chapter 1 Overview 16 Figure 1 4 Certificate System Architecture ...
Страница 82: ...Chapter 2 Installation and Configuration 60 rpm ev rhpki manage ...
Страница 154: ...132 ...
Страница 194: ...172 ...
Страница 238: ...216 ...
Страница 244: ...222 ...
Страница 246: ...224 ...
Страница 286: ...264 ...
Страница 292: ...270 ...
Страница 318: ...Chapter 13 Certificate Profiles 296 Parameter IssuerType_n IssuerName_n ...
Страница 321: ...Freshest CRL Extension Default 299 Parameter PointName_n PointIssuerName_n ...
Страница 371: ...Configuring Mappers 349 Figure 15 9 Selecting a New Mapper Type 6 Edit the mapper instance and click OK ...
Страница 398: ...376 ...
Страница 412: ...390 ...
Страница 472: ...450 ...
Страница 500: ...Appendix A Certificate and CRL Extensions 478 Parameter namen Table A 8 IssuerAlternativeName Configuration Parameters ...
Страница 506: ...484 ...
Страница 528: ...506 ...
Страница 546: ...524 ...