Jump To Close Expand all Collapse all Table of contents Planning, Installation, and Deployment Guide I. Planning How to Deploy Red Hat Certificate System Expand section "I. Planning How to Deploy Red Hat Certificate System" Collapse section "I. Planning How to Deploy Red Hat Certificate System" 1. Introduction to Public-Key Cryptography Expand section "1. Introduction to Public-Key Cryptography" Collapse section "1. Introduction to Public-Key Cryptography" 1.1. Encryption and Decryption Expand section "1.1. Encryption and Decryption" Collapse section "1.1. Encryption and Decryption" 1.1.1. Symmetric-Key Encryption 1.1.2. Public-Key Encryption 1.1.3. Key Length and Encryption Strength 1.2. Digital Signatures 1.3. Certificates and Authentication Expand section "1.3. Certificates and Authentication" Collapse section "1.3. Certificates and Authentication" 1.3.1. A Certificate Identifies Someone or Something 1.3.2. Authentication Confirms an Identity Expand section "1.3.2. Authentication Confirms an Identity" Collapse section "1.3.2. Authentication Confirms an Identity" 1.3.2.1. Password-Based Authentication 1.3.2.2. Certificate-Based Authentication 1.3.3. Uses for Certificates Expand section "1.3.3. Uses for Certificates" Collapse section "1.3.3. Uses for Certificates" 1.3.3.1. SSL/TLS 1.3.3.2. Signed and Encrypted Email 1.3.3.3. Single Sign-on 1.3.3.4. Object Signing 1.3.4. Types of Certificates Expand section "1.3.4. Types of Certificates" Collapse section "1.3.4. Types of Certificates" 1.3.4.1. CA Signing Certificates 1.3.4.2. Other Signing Certificates 1.3.4.3. SSL/TLS Server and Client Certificates 1.3.4.4. User Certificates 1.3.4.5. Dual-Key Pairs 1.3.4.6. Cross-Pair Certificates 1.3.5. Contents of a Certificate Expand section "1.3.5. Contents of a Certificate" Collapse section "1.3.5. Contents of a Certificate" 1.3.5.1. Certificate Data Formats Expand section "1.3.5.1. Certificate Data Formats" Collapse section "1.3.5.1. Certificate Data Formats" 1.3.5.1.1. Binary 1.3.5.1.2. Text 1.3.5.2. Distinguished Names 1.3.5.3. A Typical Certificate 1.3.6. How CA Certificates Establish Trust Expand section "1.3.6. How CA Certificates Establish Trust" Collapse section "1.3.6. How CA Certificates Establish Trust" 1.3.6.1. CA Hierarchies 1.3.6.2. Certificate Chains 1.3.6.3. Verifying a Certificate Chain 1.3.7. Certificate Status 1.4. Certificate Life Cycle Expand section "1.4. Certificate Life Cycle" Collapse section "1.4. Certificate Life Cycle" 1.4.1. Certificate Issuance 1.4.2. Certificate Expiration and Renewal 1.5. Key Management 2. Introduction to Red Hat Certificate System Expand section "2. Introduction to Red Hat Certificate System" Collapse section "2. Introduction to Red Hat Certificate System" 2.1. A Review of Certificate System Subsystems 2.2. Overview of Certificate System Subsystems Expand section "2.2. Overview of Certificate System Subsystems" Collapse section "2.2. Overview of Certificate System Subsystems" 2.2.1. Separate versus Shared Instances 2.2.2. Instance Installation Prerequisites Expand section "2.2.2. Instance Installation Prerequisites" Collapse section "2.2.2. Instance Installation Prerequisites" 2.2.2.1. Directory Server Instance Availability 2.2.2.2. PKI Packages 2.2.2.3. Instance Installation and Configuration 2.2.2.4. Instance Removal 2.2.3. Execution Management (systemctl) Expand section "2.2.3. Execution Management (systemctl)" Collapse section "2.2.3. Execution Management (systemctl)" 2.2.3.1. Starting, Stopping, Restarting, and Obtaining Status 2.2.3.2. Starting the Instance Automatically 2.2.4. Process Management (pki-server and pkidaemon) Expand section "2.2.4. Process Management (pki-server and pkidaemon)" Collapse section "2.2.4. Process Management (pki-server and pkidaemon)" 2.2.4.1. The pki-server Command Line Tool 2.2.4.2. Enabling and Disabling an Installed Subsystem Using pki-server 2.2.4.3. The pkidaemon Command Line Tool 2.2.4.4. Finding the Subsystem Web Services URLs 2.2.4.5. Starting the Certificate System Console 2.3. Certificate System Architecture Overview Expand section "2.3. Certificate System Architecture Overview" Collapse section "2.3. Certificate System Architecture Overview" 2.3.1. Java Application Server 2.3.2. Java Security Manager 2.3.3. Interfaces Expand section "2.3.3. Interfaces" Collapse section "2.3.3. Interfaces" 2.3.3.1. Servlet Interface 2.3.3.2. Administrative Interface 2.3.3.3. End-Entity Interface 2.3.3.4. Operator Interface 2.3.4. REST Interface 2.3.5. JSS 2.3.6. Tomcatjss 2.3.7. PKCS #11 Expand section "2.3.7. PKCS #11" Collapse section "2.3.7. PKCS #11" 2.3.7.1. NSS Soft Token (internal token) 2.3.7.2. Hardware Security Module (HSM, external token) 2.3.8. Certificate System Serial Number Management Expand section "2.3.8. Certificate System Serial Number Management" Collapse section "2.3.8. Certificate System Serial Number Management" 2.3.8.1. Serial Number Ranges 2.3.8.2. Random Serial Number Management 2.3.9. Security Domain 2.3.10. Passwords and Watchdog (nuxwdog) 2.3.11. Internal LDAP Database 2.3.12. Security-Enhanced Linux (SELinux) 2.3.13. Self-tests 2.3.14. Logs Expand section "2.3.14. Logs" Collapse section "2.3.14. Logs" 2.3.14.1. Audit Log 2.3.14.2. System Log 2.3.14.3. Transactions Log 2.3.14.4. Debug Logs 2.3.14.5. Installation Logs 2.3.14.6. Tomcat Error and Access Logs 2.3.14.7. Self-Tests Log 2.3.14.8. journalctl Logs 2.3.15. Instance Layout Expand section "2.3.15. Instance Layout" Collapse section "2.3.15. Instance Layout" 2.3.15.1. File and Directory Locations for Certificate System 2.3.15.2. CA Subsystem Information 2.3.15.3. KRA Subsystem Information 2.3.15.4. OCSP Subsystem Information 2.3.15.5. TKS Subsystem Information 2.3.15.6. TPS Subsystem Information 2.3.15.7. Shared Certificate System Subsystem File Locations 2.4. PKI with Certificate System Expand section "2.4. PKI with Certificate System" Collapse section "2.4. PKI with Certificate System" 2.4.1. Issuing Certificates Expand section "2.4.1. Issuing Certificates" Collapse section "2.4.1. Issuing Certificates" 2.4.1.1. The Enrollment Process Expand section "2.4.1.1. The Enrollment Process" Collapse section "2.4.1.1. The Enrollment Process" 2.4.1.1.1. Enrollment Using the User Interface 2.4.1.1.2. Enrollment Using the Command Line Expand section "2.4.1.1.2. Enrollment Using the Command Line" Collapse section "2.4.1.1.2. Enrollment Using the Command Line" 2.4.1.1.2.1. Enrolling Using the pki Utility 2.4.1.1.2.2. Enrolling with CMC Expand section "2.4.1.1.2.2. Enrolling with CMC" Collapse section "2.4.1.1.2.2. Enrolling with CMC" 2.4.1.1.2.2.1. CMC Enrollment without POP 2.4.1.1.2.2.2. Signed CMC Requests 2.4.1.1.2.2.3. Unsigned CMC Requests 2.4.1.1.2.2.4. The Shared Secret Workflow 2.4.1.1.2.2.5. Simple CMC Requests 2.4.1.2. Certificate Profiles 2.4.1.3. Authentication for Certificate Enrollment 2.4.1.4. Cross-Pair Certificates 2.4.2. Renewing Certificates 2.4.3. Publishing Certificates and CRLs 2.4.4. Revoking Certificates and Checking Status Expand section "2.4.4. Revoking Certificates and Checking Status" Collapse section "2.4.4. Revoking Certificates and Checking Status" 2.4.4.1. Revoking Certificates 2.4.4.2. Certificate Status Expand section "2.4.4.2. Certificate Status" Collapse section "2.4.4.2. Certificate Status" 2.4.4.2.1. CRLs 2.4.4.2.2. OCSP Services Expand section "2.4.4.2.2. OCSP Services" Collapse section "2.4.4.2.2. OCSP Services" 2.4.4.2.2.1. OCSP Response Signing 2.4.4.2.2.2. OCSP Responses 2.4.4.2.2.3. OCSP Services 2.4.5. Archiving, Recovering, and Rotating Keys Expand section "2.4.5. Archiving, Recovering, and Rotating Keys" Collapse section "2.4.5. Archiving, Recovering, and Rotating Keys" 2.4.5.1. Archiving Keys 2.4.5.2. Recovering Keys 2.4.5.3. KRA Transport Key Rotation 2.5. Smart Card Token Management with Certificate System Expand section "2.5. Smart Card Token Management with Certificate System" Collapse section "2.5. Smart Card Token Management with Certificate System" 2.5.1. Token Key Service (TKS) Expand section "2.5.1. Token Key Service (TKS)" Collapse section "2.5.1. Token Key Service (TKS)" 2.5.1.1. Master Keys and Key Sets 2.5.1.2. Key Ceremony (Shared Key Transport) 2.5.1.3. Key Update (Key Changeover) 2.5.1.4. APDUs and Secure Channels 2.5.2. Token Processing System (TPS) Expand section "2.5.2. Token Processing System (TPS)" Collapse section "2.5.2. Token Processing System (TPS)" 2.5.2.1. Coolkey Applet 2.5.2.2. Token Operations 2.5.2.3. TPS Profiles 2.5.2.4. Token Database Expand section "2.5.2.4. Token Database" Collapse section "2.5.2.4. Token Database" 2.5.2.4.1. Token States and Transitions Expand section "2.5.2.4.1. Token States and Transitions" Collapse section "2.5.2.4.1. Token States and Transitions" 2.5.2.4.1.1. Token States 2.5.2.4.1.2. Token State Transitions Done Using the Graphical or Command Line Interface Expand section "2.5.2.4.1.2. Token State Transitions Done Using the Graphical or Command Line Interface" Collapse section "2.5.2.4.1.2. Token State Transitions Done Using the Graphical or Command Line Interface" 2.5.2.4.1.2.1. Token State Transitions Using the Command Line or Graphical Interface 2.5.2.4.1.3. Token State Transitions using Token Operations 2.5.2.4.1.4. Token State and Transition Labels 2.5.2.4.1.5. Customizing Allowed Token State Transitions 2.5.2.4.1.6. Customizing Token State and Transition Labels 2.5.2.4.1.7. Token Activity Log 2.5.2.4.2. Token Policies 2.5.2.5. Mapping Resolver 2.5.2.6. TPS Roles 2.5.3. TKS/TPS Shared Secret 2.5.4. Enterprise Security Client (ESC) 2.6. Red Hat Certificate System Services Expand section "2.6. Red Hat Certificate System Services" Collapse section "2.6. Red Hat Certificate System Services" 2.6.1. Notifications 2.6.2. Jobs 2.6.3. Logging 2.6.4. Auditing 2.6.5. Self-Tests 2.6.6. Users, Authorization, and Access Controls Expand section "2.6.6. Users, Authorization, and Access Controls" Collapse section "2.6.6. Users, Authorization, and Access Controls" 2.6.6.1. Default Administrative Roles 2.6.6.2. Built-in Subsystem Trust Roles 2.7. Cloning Expand section "2.7. Cloning" Collapse section "2.7. Cloning" 2.7.1. About Cloning 2.7.2. Preparing Clones 2.7.3. Cloning for CAs 2.7.4. Cloning for KRAs 2.7.5. Cloning for Other Subsystems 2.7.6. Cloning and Key Stores 2.7.7. LDAP and Port Considerations 2.7.8. Replica ID Numbers 2.7.9. Custom Configuration and Clones 3. Supported Standards and Protocols Expand section "3. Supported Standards and Protocols" Collapse section "3. Supported Standards and Protocols" 3.1. TLS, ECC, and RSA Expand section "3.1. TLS, ECC, and RSA" Collapse section "3.1. TLS, ECC, and RSA" 3.1.1. Supported Cipher Suites Expand section "3.1.1. Supported Cipher Suites" Collapse section "3.1.1. Supported Cipher Suites" 3.1.1.1. Recommended TLS Cipher Suites 3.2. Allowed Key Algorithms and Their Sizes 3.3. Allowed Hash Functions 3.4. IPv4 and IPv6 Addresses 3.5. Supported PKIX Formats and Protocols 4. Supported Platforms Expand section "4. Supported Platforms" Collapse section "4. Supported Platforms" 4.1. General Requirements 4.2. Server Support 4.3. Supported Web Browsers 4.4. Supported Hardware Security Modules 5. Planning the Certificate System Expand section "5. Planning the Certificate System" Collapse section "5. Planning the Certificate System" 5.1. Deciding on the Required Subsystems Expand section "5.1. Deciding on the Required Subsystems" Collapse section "5.1. Deciding on the Required Subsystems" 5.1.1. Using a Single Certificate Manager 5.1.2. Planning for Lost Keys: Key Archival and Recovery 5.1.3. Balancing Certificate Request Processing 5.1.4. Balancing Client OCSP Requests 5.1.5. Using Smart Cards 5.2. Defining the Certificate Authority Hierarchy Expand section "5.2. Defining the Certificate Authority Hierarchy" Collapse section "5.2. Defining the Certificate Authority Hierarchy" 5.2.1. Subordination to a Public CA 5.2.2. Subordination to a Certificate System CA 5.2.3. Linked CA 5.2.4. CA Cloning 5.3. Planning Security Domains 5.4. Determining the Requirements for Subsystem Certificates Expand section "5.4. Determining the Requirements for Subsystem Certificates" Collapse section "5.4. Determining the Requirements for Subsystem Certificates" 5.4.1. Determining Which Certificates to Install 5.4.2. Planning the CA Distinguished Name 5.4.3. Setting the CA Signing Certificate Validity Period 5.4.4. Choosing the Signing Key Type and Length 5.4.5. Using Certificate Extensions Expand section "5.4.5. Using Certificate Extensions" Collapse section "5.4.5. Using Certificate Extensions" 5.4.5.1. Structure of Certificate Extensions 5.4.6. Using and Customizing Certificate Profiles Expand section "5.4.6. Using and Customizing Certificate Profiles" Collapse section "5.4.6. Using and Customizing Certificate Profiles" 5.4.6.1. Adding SAN Extensions to the SSL Server Certificate 5.4.7. Planning Authentication Methods 5.4.8. Publishing Certificates and CRLs 5.4.9. Renewing or Reissuing CA Signing Certificates 5.5. Planning for Network and Physical Security Expand section "5.5. Planning for Network and Physical Security" Collapse section "5.5. Planning for Network and Physical Security" 5.5.1. Considering Firewalls 5.5.2. Considering Physical Security and Location 5.5.3. Planning Ports 5.6. Tokens for Storing Certificate System Subsystem Keys and Certificates 5.7. A Checklist for Planning the PKI 5.8. Optional Third-party Services Expand section "5.8. Optional Third-party Services" Collapse section "5.8. Optional Third-party Services" 5.8.1. Load Balancers 5.8.2. Backup Hardware and Software II. Installing Red Hat Certificate System Expand section "II. Installing Red Hat Certificate System" Collapse section "II. Installing Red Hat Certificate System" 6. Prerequisites and Preparation for Installation Expand section "6. Prerequisites and Preparation for Installation" Collapse section "6. Prerequisites and Preparation for Installation" 6.1. Installing Red Hat Enterprise Linux 6.2. Securing the System Using SELinux Expand section "6.2. Securing the System Using SELinux" Collapse section "6.2. Securing the System Using SELinux" 6.2.1. Verifying if SELinux is Running in Enforcing Mode 6.3. Firewall Configuration Expand section "6.3. Firewall Configuration" Collapse section "6.3. Firewall Configuration" 6.3.1. Opening the Required Ports in the Firewall 6.4. Hardware Security Module Expand section "6.4. Hardware Security Module" Collapse section "6.4. Hardware Security Module" 6.4.1. Setting up SELinux for an HSM 6.4.2. Enabling FIPS Mode on an HSM 6.4.3. Verifying if FIPS Mode is Enabled on an HSM Expand section "6.4.3. Verifying if FIPS Mode is Enabled on an HSM" Collapse section "6.4.3. Verifying if FIPS Mode is Enabled on an HSM" 6.4.3.1. Verifying if FIPS Mode is Enabled on an nCipher HSM 6.4.3.2. Verifying if FIPS Mode is Enabled on a Luna SA HSM 6.4.4. Preparing for Installing Certificate System with an HSM Expand section "6.4.4. Preparing for Installing Certificate System with an HSM" Collapse section "6.4.4. Preparing for Installing Certificate System with an HSM" 6.4.4.1. nCipher HSM Parameters 6.4.4.2. SafeNet / Luna SA HSM Parameters 6.4.5. Backing up Keys on Hardware Security Modules 6.5. Installing Red Hat Directory Server Expand section "6.5. Installing Red Hat Directory Server" Collapse section "6.5. Installing Red Hat Directory Server" 6.5.1. Preparing a Directory Server Instance for Certificate System 6.5.2. Enabling TLS Support in Directory Server Expand section "6.5.2. Enabling TLS Support in Directory Server" Collapse section "6.5.2. Enabling TLS Support in Directory Server" 6.5.2.1. How to Enable LDAPS for new Red Hat Certificate System Subsystems Using Examples Values 6.5.3. Preparing for Configuring Certificate System 6.5.4. Replacing the Temporary Certificate 6.5.5. Enabling TLS Client Authentication 6.6. Attaching a Red Hat Subscription and Enabling the Certificate System Package Repository 6.7. Certificate System Operating System Users and Groups 7. Installing and Configuring Certificate System Expand section "7. Installing and Configuring Certificate System" Collapse section "7. Installing and Configuring Certificate System" 7.1. Subsystem Configuration Order 7.2. Certificate System Packages Expand section "7.2. Certificate System Packages" Collapse section "7.2. Certificate System Packages" 7.2.1. Updating Certificate System Packages 7.2.2. Determining Certificate System Product Version 7.3. Understanding the pkispawn Utility 7.4. Setting Up a Root Certificate Authority 7.5. Post-Installation 7.6. Setting up Additional Subsystems 7.7. Two-step Installation Expand section "7.7. Two-step Installation" Collapse section "7.7. Two-step Installation" 7.7.1. When to Use the Two-Step Installation 7.7.2. The Two Major Parts of the Two-step Installation 7.7.3. Creating the Configuration File for the First Step of the Installation 7.7.4. Starting the Installation Step 7.7.5. Customizing the Configuration Between the Installation Steps Expand section "7.7.5. Customizing the Configuration Between the Installation Steps" Collapse section "7.7.5. Customizing the Configuration Between the Installation Steps" 7.7.5.1. Configuring Certificate Profiles 7.7.5.2. Enabling Signed Audit Logging 7.7.5.3. Updating the Ciphers List 7.7.5.4. Configuring the PKI Console Timeout 7.7.5.5. Setting the KRA into Encryption Mode 7.7.5.6. Enabling OCSP 7.7.5.7. Configuring Ranges for Requests and Serial Numbers 7.7.6. Starting the Configuration Step 7.7.7. Post-Installation 7.8. Setting up Subsystems with an External CA Expand section "7.8. Setting up Subsystems with an External CA" Collapse section "7.8. Setting up Subsystems with an External CA" 7.8.1. The Difference Between an Internal and External CA 7.8.2. Installing a Subsystem with an External CA 7.8.3. Post-Installation 7.9. Setting up a Standalone KRA or OCSP 7.10. Post-installation Tasks Expand section "7.10. Post-installation Tasks" Collapse section "7.10. Post-installation Tasks" 7.10.1. Setting Date/Time for RHCS 7.10.2. Replacing a Temporary Self-Signed Certificate in Directory Server (CA) 7.10.3. Enabling TLS Client Authentication for the Internal LDAP Server 7.10.4. Configuring Session Timeout 7.10.5. CRL or Certificate Publishing 7.10.6. Configuring Certificate Enrollment Profiles (CA) 7.10.7. Enabling Access Banner 7.10.8. Enabling the Watchdog Service 7.10.9. Configuration for CMC Enrollment and Revocation (CA) 7.10.10. TLS client-authentication for the Java Console 7.10.11. Creating a Role User 7.10.12. Removing the Bootstrap User 7.10.13. Disabling Multi-role Support 7.10.14. KRA Configurations Expand section "7.10.14. KRA Configurations" Collapse section "7.10.14. KRA Configurations" 7.10.14.1. Adding Requirement for Multiple Agent Approval for Key Recovery Authority (KRA) 7.10.14.2. Configuring KRA Encryption Settings 7.10.15. Setting up Users to use User Interfaces 8. Using Hardware Security Modules for Subsystem Security Databases Expand section "8. Using Hardware Security Modules for Subsystem Security Databases" Collapse section "8. Using Hardware Security Modules for Subsystem Security Databases" 8.1. Installing Certificate System with an HSM 8.2. Using Hardware Security Modules with Subsystems Expand section "8.2. Using Hardware Security Modules with Subsystems" Collapse section "8.2. Using Hardware Security Modules with Subsystems" 8.2.1. Enabling the FIPS Mode on an HSM 8.2.2. Verifying if FIPS Mode is Enabled on an HSM Expand section "8.2.2. Verifying if FIPS Mode is Enabled on an HSM" Collapse section "8.2.2. Verifying if FIPS Mode is Enabled on an HSM" 8.2.2.1. Verifying if FIPS Mode is Enabled on an nCipher HSM 8.2.2.2. Verifying if FIPS Mode is Enabled on a Luna SA HSM 8.2.3. Adding or Managing the HSM Entry for a Subsystem 8.2.4. Setting up SELinux for an HSM 8.2.5. Installing a Subsystem Using nCipher nShield HSM 8.2.6. Installing a Subsystem Using Gemalto Safenet LunaSA HSM 8.3. Backing up Keys on Hardware Security Modules 8.4. Installing a Clone Subsystem Using an HSM 8.5. Viewing Tokens 8.6. Detecting Tokens 8.7. Failover and Resilience Expand section "8.7. Failover and Resilience" Collapse section "8.7. Failover and Resilience" 8.7.1. nCipher nShield HSM Expand section "8.7.1. nCipher nShield HSM" Collapse section "8.7.1. nCipher nShield HSM" 8.7.1.1. Failover 8.7.1.2. Resilience 8.7.2. Gemalto Safenet LunaSA HSM Expand section "8.7.2. Gemalto Safenet LunaSA HSM" Collapse section "8.7.2. Gemalto Safenet LunaSA HSM" 8.7.2.1. Failover 9. Installing an Instance with ECC System Certificates Expand section "9. Installing an Instance with ECC System Certificates" Collapse section "9. Installing an Instance with ECC System Certificates" 9.1. Loading a Third-Party ECC Module 9.2. Using ECC with an HSM 10. Cloning Subsystems Expand section "10. Cloning Subsystems" Collapse section "10. Cloning Subsystems" 10.1. Backing up Subsystem Keys from a Software Database 10.2. Cloning a CA 10.3. Updating CA-KRA Connector Information After Cloning 10.4. Cloning OCSP Subsystems 10.5. Cloning KRA Subsystems 10.6. Cloning TKS Subsystems 10.7. Converting Masters and Clones Expand section "10.7. Converting Masters and Clones" Collapse section "10.7. Converting Masters and Clones" 10.7.1. Converting CA Clones and Masters 10.7.2. Converting OCSP Clones 10.8. Cloning a CA That Has Been Re-Keyed 11. Additional Installation Options Expand section "11. Additional Installation Options" Collapse section "11. Additional Installation Options" 11.1. Lightweight Sub-CAs Expand section "11.1. Lightweight Sub-CAs" Collapse section "11.1. Lightweight Sub-CAs" 11.1.1. Setting up a Lightweight Sub-CA 11.1.2. Disabling the Creation of Lightweight Sub-CAs 11.1.3. Re-enabling the Creation of Lightweight Sub-CAs 11.2. Enabling IPv6 for a Subsystem 11.3. Enabling LDAP-based Enrollment Profiles 11.4. Customizing TLS Ciphers 12. Troubleshooting Installation and Cloning III. Configuring Certificate System Expand section "III. Configuring Certificate System" Collapse section "III. Configuring Certificate System" 13. The Certificate System Configuration Files Expand section "13. The Certificate System Configuration Files" Collapse section "13. The Certificate System Configuration Files" 13.1. File and Directory Locations for Certificate System Subsystems Expand section "13.1. File and Directory Locations for Certificate System Subsystems" Collapse section "13.1. File and Directory Locations for Certificate System Subsystems" 13.1.1. Instance-specific Information 13.1.2. CA Subsystem Information 13.1.3. KRA Subsystem Information 13.1.4. OCSP Subsystem Information 13.1.5. TKS Subsystem Information 13.1.6. TPS Subsystem Information 13.1.7. Shared Certificate System Subsystem File Locations 13.2. CS.cfg Files Expand section "13.2. CS.cfg Files" Collapse section "13.2. CS.cfg Files" 13.2.1. Locating the CS.cfg File 13.2.2. Editing the Configuration File 13.2.3. Overview of the CS.cfg Configuration File Expand section "13.2.3. Overview of the CS.cfg Configuration File" Collapse section "13.2.3. Overview of the CS.cfg Configuration File" 13.2.3.1. Basic Subsystem Settings 13.2.3.2. Logging Settings 13.2.3.3. Authentication and Authorization Settings 13.2.3.4. Subsystem Certificate Settings 13.2.3.5. Settings for Required Subsystems 13.2.3.6. Database Settings 13.2.3.7. Enabling and Configuring a Publishing Queue Expand section "13.2.3.7. Enabling and Configuring a Publishing Queue" Collapse section "13.2.3.7. Enabling and Configuring a Publishing Queue" 13.2.3.7.1. Enabling and Configuring a Publishing Queue by editing the CS.cfg file 13.2.3.8. Settings for PKI Tasks 13.2.3.9. Changing DN Attributes in CA-Issued Certificates Expand section "13.2.3.9. Changing DN Attributes in CA-Issued Certificates" Collapse section "13.2.3.9. Changing DN Attributes in CA-Issued Certificates" 13.2.3.9.1. Adding New or Custom Attributes 13.2.3.9.2. Changing the DER-Encoding Order 13.2.3.10. Setting a CA to Use a Different Certificate to Sign CRLs 13.2.3.11. Configuring CRL Generation from Cache in CS.cfg 13.2.3.12. Configuring Update Intervals for CRLs in CS.cfg 13.2.3.13. Changing the Access Control Settings for the Subsystem 13.2.3.14. Configuring Ranges for Requests and Serial Numbers 13.2.3.15. Setting Requirement for pkiconsole to use TLS Client Certificate Authentication 13.3. Managing System Passwords Expand section "13.3. Managing System Passwords" Collapse section "13.3. Managing System Passwords" 13.3.1. Configuring the password.conf File 13.3.2. Using the Certificate System Watchdog Service Expand section "13.3.2. Using the Certificate System Watchdog Service" Collapse section "13.3.2. Using the Certificate System Watchdog Service" 13.3.2.1. Enabling the Watchdog Service 13.3.2.2. Starting and Stopping Certificate System with the Watchdog Enabled 13.3.2.3. Verifying That the Certificate System Watchdog Service is Enabled 13.3.2.4. Disabling the Watchdog Service 13.4. Configuration Files for the Tomcat Engine and Web Services Expand section "13.4. Configuration Files for the Tomcat Engine and Web Services" Collapse section "13.4. Configuration Files for the Tomcat Engine and Web Services" 13.4.1. Tomcatjss Expand section "13.4.1. Tomcatjss" Collapse section "13.4.1. Tomcatjss" 13.4.1.1. TLS Cipher Configuration Expand section "13.4.1.1. TLS Cipher Configuration" Collapse section "13.4.1.1. TLS Cipher Configuration" 13.4.1.1.1. Client TLS cipher Configuration 13.4.1.2. Enabling Automatic Revocation Checking on the CA 13.4.1.3. Enabling Certificate Revocation Checking for Subsystems 13.4.1.4. Adding an AIA Extension to an Enrollment Profile 13.4.2. Session Timeout Expand section "13.4.2. Session Timeout" Collapse section "13.4.2. Session Timeout" 13.4.2.1. TLS Session Timeout 13.4.2.2. HTTP Session Timeout 13.4.2.3. Session Timeout for PKI Web UI 13.4.2.4. Session Timeout for PKI Console 13.4.2.5. Session Timeout for PKI CLI 13.5. web.xml Expand section "13.5. web.xml" Collapse section "13.5. web.xml" 13.5.1. Removing Unused Interfaces from web.xml (CA Only) 13.6. Customizing Web Services Expand section "13.6. Customizing Web Services" Collapse section "13.6. Customizing Web Services" 13.6.1. Customizing Subsystem Web Applications 13.6.2. Customizing the Web UI Theme 13.6.3. Customizing TPS Token State Labels 13.7. Using an Access Banner Expand section "13.7. Using an Access Banner" Collapse section "13.7. Using an Access Banner" 13.7.1. Enabling an Access Banner 13.7.2. Disabling an Access Banner 13.7.3. Displaying the Banner 13.7.4. Validating the Banner 13.8. Configuration for CMC Expand section "13.8. Configuration for CMC" Collapse section "13.8. Configuration for CMC" 13.8.1. Understanding How CMC Works 13.8.2. Enabling the PopLinkWittnessV2 Feature 13.8.3. Enabling the CMC Shared Secret Feature 13.8.4. Enabling CMCRevoke for the Web User Interface 13.9. Configuration for Server-Side Key Generation for Certificate Enrollment using the CA EE Portal Expand section "13.9. Configuration for Server-Side Key Generation for Certificate Enrollment using the CA EE Portal" Collapse section "13.9. Configuration for Server-Side Key Generation for Certificate Enrollment using the CA EE Portal" 13.9.1. Installation Configuration 13.9.2. Profile Configuration 14. Managing Certificate/Key Crypto Token Expand section "14. Managing Certificate/Key Crypto Token" Collapse section "14. Managing Certificate/Key Crypto Token" 14.1. About certutil and PKICertImport Expand section "14.1. About certutil and PKICertImport" Collapse section "14.1. About certutil and PKICertImport" 14.1.1. certutil Basic Usage 14.1.2. PKICertImport Basic Usage 14.1.3. certutil Common Commands 14.1.4. Common certutil and PKICertImport Options 14.2. Importing a Root Certificate 14.3. Importing an Intermediate Certificate Chain 14.4. Importing a certificate into an HSM 14.5. Importing a certificate into an NSS Database 15. Certificate Profiles Configuration Expand section "15. Certificate Profiles Configuration" Collapse section "15. Certificate Profiles Configuration" 15.1. Creating and Editing Certificate Profiles Directly on the File System Expand section "15.1. Creating and Editing Certificate Profiles Directly on the File System" Collapse section "15.1. Creating and Editing Certificate Profiles Directly on the File System" 15.1.1. Configuring non-CA System Certificate Profiles Expand section "15.1.1. Configuring non-CA System Certificate Profiles" Collapse section "15.1.1. Configuring non-CA System Certificate Profiles" 15.1.1.1. Profile Configuration Parameters 15.1.1.2. Modifying Certificate Extensions Directly on the File System Expand section "15.1.1.2. Modifying Certificate Extensions Directly on the File System" Collapse section "15.1.1.2. Modifying Certificate Extensions Directly on the File System" 15.1.1.2.1. Key Usage and Extended Key Usage Consistency 15.1.1.2.2. Configuring Cross-Pair Profiles 15.1.1.3. Adding Profile Inputs Directly on the File System 15.1.2. Changing the Default Validity Time of Certificates 15.1.3. Configuring CA System Certificate Profiles 15.1.4. Managing Smart Card CA Profiles Expand section "15.1.4. Managing Smart Card CA Profiles" Collapse section "15.1.4. Managing Smart Card CA Profiles" 15.1.4.1. Editing Enrollment Profiles for the TPS 15.1.4.2. Creating Custom TPS Profiles 15.1.4.3. Using the Windows Smart Card Logon Profile 15.1.5. Disabling Certificate Enrolment Profiles 16. Configuring the Key Recovery Authority Expand section "16. Configuring the Key Recovery Authority" Collapse section "16. Configuring the Key Recovery Authority" 16.1. Manually Setting up Key Archival 16.2. Encryption Of KRA Operations Expand section "16.2. Encryption Of KRA Operations" Collapse section "16.2. Encryption Of KRA Operations" 16.2.1. How Clients Manage Key Operation Encryption 16.2.2. Configuring the Encryption Algorithm in the KRA Expand section "16.2.2. Configuring the Encryption Algorithm in the KRA" Collapse section "16.2.2. Configuring the Encryption Algorithm in the KRA" 16.2.2.1. Explanation of Parameters and their Values 16.2.2.2. Solving Limitations of HSMs When Using AES Encryption in KRAs 16.3. Setting up Agent-Approved Key Recovery Schemes Expand section "16.3. Setting up Agent-Approved Key Recovery Schemes" Collapse section "16.3. Setting up Agent-Approved Key Recovery Schemes" 16.3.1. Configuring Agent-Approved Key Recovery in the Command Line 16.3.2. Customizing the Key Recovery Form 16.3.3. Rewrapping Keys in a New Private Storage Key Expand section "16.3.3. Rewrapping Keys in a New Private Storage Key" Collapse section "16.3.3. Rewrapping Keys in a New Private Storage Key" 16.3.3.1. About KRATool 16.3.3.2. Rewrapping and Merging Keys from One or More KRAs into a Single KRA 16.3.4. Updating CA-KRA Connector Information After Cloning 17. Configuring Logs Expand section "17. Configuring Logs" Collapse section "17. Configuring Logs" 17.1. Certificate System Log Settings Expand section "17.1. Certificate System Log Settings" Collapse section "17.1. Certificate System Log Settings" 17.1.1. Services That Are Logged 17.1.2. Log Levels (Message Categories) 17.1.3. Buffered and Unbuffered Logging 17.1.4. Log File Rotation 17.2. Operating System (external to RHCS) Log Settings Expand section "17.2. Operating System (external to RHCS) Log Settings" Collapse section "17.2. Operating System (external to RHCS) Log Settings" 17.2.1. Enabling OS-level Audit Logs Expand section "17.2.1. Enabling OS-level Audit Logs" Collapse section "17.2.1. Enabling OS-level Audit Logs" 17.2.1.1. Auditing Certificate System Audit Log Deletion 17.2.1.2. Auditing Unauthorized Certificate System Use of Secret Keys 17.2.1.3. Auditing Time Change Events 17.2.1.4. Auditing Access to Certificate System Configuration 17.3. Configuring Logs in the CS.cfg File Expand section "17.3. Configuring Logs in the CS.cfg File" Collapse section "17.3. Configuring Logs in the CS.cfg File" 17.3.1. Enabling and Configuring Signed Audit Log Expand section "17.3.1. Enabling and Configuring Signed Audit Log" Collapse section "17.3.1. Enabling and Configuring Signed Audit Log" 17.3.1.1. Enabling Signed Audit Logging 17.3.1.2. Configuring Audit Events Expand section "17.3.1.2. Configuring Audit Events" Collapse section "17.3.1.2. Configuring Audit Events" 17.3.1.2.1. Enabling and Disabling Audit Events 17.3.1.2.2. Filtering Audit Events 17.3.2. Configuring Self-Tests Expand section "17.3.2. Configuring Self-Tests" Collapse section "17.3.2. Configuring Self-Tests" 17.3.2.1. Default Self-Tests at Startup 17.3.2.2. Modifying Self-Test Configuration 17.3.3. Additional Configuration for Debug Log Expand section "17.3.3. Additional Configuration for Debug Log" Collapse section "17.3.3. Additional Configuration for Debug Log" 17.3.3.1. Enabling and Disabling Debug Logging 17.3.3.2. Setting up Rotation of Debug Log Files 17.4. Audit Retention Expand section "17.4. Audit Retention" Collapse section "17.4. Audit Retention" 17.4.1. Location of Audit Data Expand section "17.4.1. Location of Audit Data" Collapse section "17.4.1. Location of Audit Data" 17.4.1.1. Location of Audit Logs 17.4.1.2. Location of Certificate Requests and Certificate Records 18. Creating a Role User Expand section "18. Creating a Role User" Collapse section "18. Creating a Role User" 18.1. Creating a PKI Administrative User on the Operating System 18.2. Creating a PKI Role User in Certificate System 19. Deleting the Bootstrap User Expand section "19. Deleting the Bootstrap User" Collapse section "19. Deleting the Bootstrap User" 19.1. Disabling Multi-roles Support IV. Upgrading Certificate System from 9.x to the latest version Expand section "IV. Upgrading Certificate System from 9.x to the latest version" Collapse section "IV. Upgrading Certificate System from 9.x to the latest version" 20. Upgrading the Packages and Configuration Files 21. Upgrading the Database Expand section "21. Upgrading the Database" Collapse section "21. Upgrading the Database" 21.1. Upgrading the Database from 9.0 to 9.1 Expand section "21.1. Upgrading the Database from 9.0 to 9.1" Collapse section "21.1. Upgrading the Database from 9.0 to 9.1" 21.1.1. Upgrading the Database Schema 21.1.2. Upgrading the CA Database 21.1.3. Upgrading the KRA database 21.1.4. Upgrading the TPS database 21.2. Upgrading the Database from 9.1 and above V. Migrating to Certificate System 9 Expand section "V. Migrating to Certificate System 9" Collapse section "V. Migrating to Certificate System 9" 22. Migrating From Certificate System 8 to 9 Expand section "22. Migrating From Certificate System 8 to 9" Collapse section "22. Migrating From Certificate System 8 to 9" 22.1. Exporting Data from the Previous System 22.2. Setting up the CA on the New Host 22.3. Importing the Data into the New CA 22.4. Reassigning Users to Default Groups 23. Migrating an OpenSSL CA to Certificate System Expand section "23. Migrating an OpenSSL CA to Certificate System" Collapse section "23. Migrating an OpenSSL CA to Certificate System" 23.1. Migrating an OpenSSL CA to Certificate System When Not Using an HSM 23.2. Migrating an OpenSSL CA to Certificate System When Using an HSM VI. Uninstalling Certificate System Subsystems Expand section "VI. Uninstalling Certificate System Subsystems" Collapse section "VI. Uninstalling Certificate System Subsystems" 24. Removing a Subsystem 25. Removing Certificate System Subsystem Packages Glossary Index A. Revision History Legal Notice Settings Close Language: English 日本語 Language: English 日本語 Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: English 日本語 Language: English 日本語 Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF 11.4. Customizing TLS Ciphers It is possible to enforce TLS ciphers during the installation. See the Configuring Ciphers section in the Red Hat Certificate System Administration Guide. Previous Next