6.2. Enabling Smart Card Login
- Log into the system as root.
- Download the root CA certificates for the network in base 64 format, and install them on the server. The certificates are installed in the appropriate system database using the
certutilcommand. For example:
# certutil -A -d /etc/pki/nssdb -n "root CA cert" -t "CT,C,C" -i /tmp/ca_cert.crt
- In the top menu, select themenu, select , and then click .
- Open the Advanced Options tab.
- Click the Enable Smart Card Support checkbox.
- When the button is active, click.There are two behaviors that can be configured for smart cards:
- The Require smart card for login checkbox requires smart cards and essentially disables Kerberos password authentication for logging into the system. Do not select this until after you have successfully logged in using a smart card.
- The Card removal action menu sets the response that the system takes if the smart card is removed during an active session.
Ignoremeans that the system continues functioning as normal if the smart card is removed, while
Lockimmediately locks the screen.
- By default, the mechanisms to check whether a certificate has been revoked (Online Certificate Status Protocol, or OCSP, responses) are disabled. To validate whether a certificate has been revoked before its expiration period, enable OCSP checking by adding the
ocsp_onoption to the
- Open the
- Change every
cert_policyline so that it contains the
cert_policy = ca,
NoteBecause of the way the file is parsed, there must be a space between
cert_policyand the equals sign. Otherwise, parsing the parameter fails.
- If the smart card has not yet been enrolled (set up with personal certificates and keys), enroll the smart card, as described in Section 5.3, “Enrolling a Smart Card Automatically”.
- If the smart card is a CAC card, the PAM modules used for smart card login must be configured to recognize the specific CAC card.
- As root, create a file called
- Add the following entry to the
MY.CAC_CN.123454 -> loginMY.CAC_CN.123454 is the common name on the CAC card and login is the Red Hat Enterprise Linux login ID.
pklogin_findertool (in debug mode) first maps the login ID to the certificates on the card and then attempts to output information about the validity of certificates.