Chapter 16. Authentication for Enrolling Certificates
388
NOTE
All three enrollment forms work by default with the directory-based authentication
module,
UidPwdDirAuth
, explained in
Section 16.3.1, “Setting up Directory-Based
Authentication”
. Certificate-based enrollment forms can be used with any of the
authentication modules, such as directory- and PIN-based authentication modules.
In general, the following three hidden variables distinguish certificate-based enrollment forms from
other enrollment forms:
•
certauthEnroll
This variable specifies whether certificate-based enrollment is turned
on
or
off
.
•
certauthEnrollType
This variable specifies one of the three certificate-based-enrollment
types:
dual
,
single
, or
encryption
;
dual
specifies that the enrollment request is for
dual certificates;
single
specifies that the enrollment request is for a signing certificate; and
encryption
specifies that the enrollment request is for an encryption certificate.
NOTE
Choosing
dual
requires a client that is capable of generating dual key pairs.
•
doSslAuth
This variable specifies whether the server requests SSL client authentication.
Set the value of this parameter to
on
, and make sure that the port number specified in the
authentication instance is an SSL port.
4. Before modifying a form, look at the default certificate-based enrollment forms.
16.6. Testing Enrollment
For information on testing enrollment through the profiles, see
Chapter 13, Certificate Profiles
. To test
whether end users can successfully enroll for a certificate using the authentication method set:
1. Open the end-entities page.
https://server.example.com:9443/ca/ee/ca
2. In the
Enrollment
tab, open the customized enrollment form.
3. Fill in the values, and submit the request.
4. Enter the password to the key database when prompted.
5. When the correct password is entered, the client generates the key pair.
Do not interrupt the key-generation process. Upon completion of the key generation, the request
is submitted to the server to issue the certificate. The server subjects the request to the certificate
profile and issues the certificate only if the request meets all the requirements.
When the certificate is issued, install the certificate in the browser.
Содержание CERTIFICATE SYSTEM 7.3 - ADMINISTRATION
Страница 1: ...Red Hat Certificate System 7 3 Administration Guide Publication date May 2007 updated March 25 2010 ...
Страница 15: ...xv Index 525 ...
Страница 16: ...xvi ...
Страница 38: ...Chapter 1 Overview 16 Figure 1 4 Certificate System Architecture ...
Страница 82: ...Chapter 2 Installation and Configuration 60 rpm ev rhpki manage ...
Страница 154: ...132 ...
Страница 194: ...172 ...
Страница 238: ...216 ...
Страница 244: ...222 ...
Страница 246: ...224 ...
Страница 286: ...264 ...
Страница 292: ...270 ...
Страница 318: ...Chapter 13 Certificate Profiles 296 Parameter IssuerType_n IssuerName_n ...
Страница 321: ...Freshest CRL Extension Default 299 Parameter PointName_n PointIssuerName_n ...
Страница 371: ...Configuring Mappers 349 Figure 15 9 Selecting a New Mapper Type 6 Edit the mapper instance and click OK ...
Страница 398: ...376 ...
Страница 412: ...390 ...
Страница 472: ...450 ...
Страница 500: ...Appendix A Certificate and CRL Extensions 478 Parameter namen Table A 8 IssuerAlternativeName Configuration Parameters ...
Страница 506: ...484 ...
Страница 528: ...506 ...
Страница 546: ...524 ...