Skip Headers
Oracle® Application Server Certificate Authority Administrator's Guide
10g Release 2 (10.1.2)
Part No. B14080-01
  Go To Table Of Contents
Contents
Go To Documentation Library
Home
Go To Product List
Solution Area
Go To Index
Index

Previous
Previous
Next
Next
 

4 Configuring Oracle Application Server Certificate Authority

The Oracle Application Server Certificate Authority administrative web interface covers the following three broad areas, each accessible from a tab on the home page:

This chapter describes the second and third of those areas: configuration management and viewing logs, as well as describing the content you should provide in your certification practice statement.

It contains the following sections:

Structure of the Administration Interface

The home page of the graphical user interface (GUI) for Oracle Application Server Certificate Authority presents three additional tabs, as the following figure shows:

Description of homepage.gif follows
Description of the illustration homepage.gif

These three subtabs enable you to address specific tasks in managing certificates or the Certificate Authority configuration:

Configuration Management Tab

The Configuration management tab is one of the four choices available when you first enter the Oracle Application Server Certificate Authority web environment. Clicking the Configuration Management tab on the home page displays the first of the three subtabs, each representing a grouping of the Oracle Application Server Certificate Authority configuration management facilities.

The content and use of those subtabs are explained in the following sections:

Description of configmain01.gif follows
Description of the illustration configmain01.gif

Summary of Configuration Tasks

Table 4-1, Table 4-2, and Table 4-3 list the tasks encompassed by the Notification, General, and Policy sub-tabs of Configuration Management and provide links to discussions of those tasks.

Table 4-1 Notification Sub-tab Tasks and Discussions in Configuration Management

Notification Sub-tab Tasks and Data Links to Task Discussions
Specify server name and email contacts for alerts and notifications.

Specify desired types of alerts.

Enable auto-generation of CRLs and specify its start time and the interval between generating CRLs, and the start time and interval for directory synchronizations


Table 4-2 General Sub-tab Tasks and Discussions in Configuration Management

General Sub-tab Tasks and Data Links to Task Discussions
Specify that certificate publishing uses SSL or non-SSL communication channel with Oracle Internet Directory.
Specify that end-users can use SSL and OracleAS Single Sign-On Server authentication for certificate management.
Specify logging, tracing, both, or neither.
Specify default values for DN components shown in enrollment.
See configuration parameters for the database and directory.

Table 4-3 Policy Sub-tab Tasks and Discussions in Configuration Management

Policy Sub-tab of Oracle Application Server Certificate Authority Tasks and Data (in Chapter 5) Links to Task Discussions
See the policies applicable to available operations, such as certificate requests, revocations, or renewals.
Edit, enable, disable, delete, add, or reorder policies.

Notification Sub-tab

Notification parameters control what events trigger notification emails to the administrator, how those emails are generated, and how often checking is done to reveal such events.

Changes you make to Notification configuration parameters will take effect only after Oracle Application Server Certificate Authority is restarted.

Mail Details

Mail parameters enable email notifications to be sent to the email address you specify for the administrator and to OCA users when appropriate. (Before selecting encrypted (SMIME) email, you must first create an SMIME certificate and wallet.) Notification emails use your specified server, sender, and template. You specify your choices in the following portion of the Notification subtab screen:

Description of notifnmaildetails.gif follows
Description of the illustration notifnmaildetails.gif

Note that the hint below Enable Template will, after installation, display the exact path to the template directory. For example, if $Oracle_Home is defined during installation as /private/sitename/username, then this hint will display as "Templates stored at /private/sitename/username/oca/templates/email."

Alerts

Alerts parameters enable you to specify whether you are to receive alerts in the following circumstances (if you have specified the email information):

  • When the number of pending certificate requests exceeds the queue threshold you specify here, to be checked on the schedule you specify here (start time and repeat interval). The start time is midnight unless you specify a 24-hour clock time, for example 2 hours 30 minutes for 2:30 in the morning, or 14 hours 30 minutes for 2:30 in the afternoon. The interval (default one day) is added to that time to specify the time of the next check; it must be non-zero. Changes survive restarts.

  • Whenever automatic generation of the CRL fails. Such failure could occur, for example, if the database or Oracle Internet Directory were temporarily unavailable. Other rare possibilities include unpredictable runtime or configuration errors related to memory, input/output, or connectivity issues.

You specify your choices in the following portion of the Notification subtab screen:

Description of notifnalerts.gif follows
Description of the illustration notifnalerts.gif

Scheduled Jobs

Scheduled Jobs parameters enable you to make the following choices about automatic jobs:

  • Whether a CRL is to be generated automatically, starting when, and how often thereafter. This feature, enabled by default when OCA is installed, establishes a reliable, timely, and regular process supporting applications that depend on the CRL to detect revoked or expired certificates. The start time is midnight unless you specify a 24-hour clock time, for example 2 hours 30 minutes for 2:30 in the morning, or 14 hours 30 minutes for 2:30 in the afternoon. The interval you specify is added to that start time to specify the time of the next check (default one day); it must be non-zero. Changes survive restarts.

  • Whether directories are to be synchronized, starting when, and how often thereafter. This feature ensures timely, regular updates to the certificate information in the Oracle Internet Directory. Even certificates issued (or revoked or expired) during any temporary directory downtime will be published (or removed) during synchronization. The start time is midnight unless you specify a 24-hour clock time, for example 2 hours 30 minutes for 2:30 in the morning, or 14 hours 30 minutes for 2:30 in the afternoon. The interval you specify (default one day) is added to that start time to specify the time of the next synchronization; it must be non-zero. Changes survive restarts.

You specify your choices in the following portion of the Notification subtab screen:

Description of notifnscheduledjobs.gif follows
Description of the illustration notifnscheduledjobs.gif

Email Templates

Templates are automatically turned on: you can ignore the checkbox to enable templates. You can specify and customize the body of e-mail alerts and notifications as templates, which are stored in the following directory:

$ORACLE_HOME/oca/templates/email 

You can use the tokens described below to format the e-mail to provide specific information. These tokens are replaced before the e-mail is sent. Table 4-4 lists the notifications, filenames for e-mail format and the supported tokens.

Table 4-4 Notifications, Templates, and Tokens Supported for E-mail Customization

Notifications Template File Name Supported Tokens
CertificateRequestNotify reqacc.txt #NAME#, #REQUESTID#, #SUBJECTDN#, #PHONE#, #EMAIL#
RequestApprovalNotify reqapp.txt #NAME#, #REQUESTID#, #SUBJECTDN#, #SERIALNUM#, #OCAURL#, #PHONE#, #EMAIL#, #VALIDITY#
RequestRejectionNotify reqrej.txt #NAME#, #REQUESTID#, #SUBJECTDN#, #PHONE#, #EMAIL#
PendingRequestsAlert pendreq.txt #NAME#, #NUMBERREQUESTS#
CRLAutoGenFailureAlert crlfail.txt #NAME#


Note:

If you do not check the box for Use Template in Configuration Management in the Notification screen, then templates are not used. All alerts and notifications would be predefined text that cannot be changed.

Values for the tokens

Table 4-5 describes the values that will replace each of the listed tokens before the alert or notification is sent:

Table 4-5 Token Values Supported for Customization in Notifications and Templates

Notifications and Template File Names Supported Tokens and the Data to Replace Them
CertificateRequestNotifyTemplate = reqacc.txt #NAME#: Replace with the contact data Name specified in the certificate request.

#REQUESTID#: Replace with the request ID issued by OCA to this request.

#SUBJECTDN#: Replace with the DN in the certificate request.

#PHONE#: Replace with the contact data phone number in the certificate request.

#EMAIL#: Replace with the contact data email address in the certificate request.

RequestApprovalNotify

Template = reqapp.txt

#NAME#: Replace with the contact data Name specified in the certificate request.

#REQUESTID#: Replace with the request ID issued by OCA to this request.

#SUBJECTDN#: Replace with the DN in the certificate request.

#SERIALNUM#: Replace with the serial number of the certificate

#OCAURL#: Replace with the URL of the user home page

#PHONE#: Replace with the contact data phone number in the certificate request.

#EMAIL#: Replace with the contact data email address in the certificate request.

#VALIDITY#: Replace with the validity period for which the certificate request is approved by the administrator.

RequestRejectionNotify

Template = reqrej.txt

#NAME#: Replace with the contact data Name in the certificate request.

#REQUESTID#: Replace with the request ID issued by OCA to this request.

#SUBJECTDN#: Replace with the DN in the certificate request

#PHONE#: Replace with the contact data phone number in the certificate request.

#EMAIL#: Replace with the contact data email address in the certificate request.

PendingRequestsAlert

Template = pendreq.txt

#NAME#: Replace with the value specified in the OracleAS Certificate Authority Administrator field under Configuration Management in the Notification screen.

#NUMBERREQUESTS#: Replace with the number of pending requests in the OCA repository

CRLAutoGenFailureAlert

Template = crlfail.txt

#NAME#: Replace with the value specified in the OracleAS Certificate Authority Administrator field under Configuration Management in the Notification screen.


Note:

The language in which you edit these templates is used in the final results, so it is best to use the language of the server, because the message body is encoded in the language of the server locale.

If you do not use templates, then all alerts and notifications will appear in the language of the server locale.


General Sub-tab

This sub-tab enables you to set parameters controlling the following tasks:

Changes you make to General configuration parameters will take effect only after Oracle Application Server Certificate Authority is restarted.

Certificate Publishing

The choices in this section enable you to publish certificates to the directory. Since OCA always connects to Oracle Internet Directory by using the SSL port, the second checkbox shown here is no longer needed ("Protect publication using SSL mode"). The direct Diffie Hellman SSL connection does not require authentication, and OCA then authenticates itself to the directory server by sending its username/password over the now-secured SSL connection.

Description of publishnssl.gif follows
Description of the illustration publishnssl.gif

SSL and SSO Authentication

The choices in this section let you specify that SSL or OracleAS Single Sign-On Server users can be recognized automatically, meaning that their existing certificates (or OracleAS Single Sign-On Server authentication) are accepted as authenticating their identities. Enabled by default, such acceptance means Oracle Application Server Certificate Authority will issue them a new certificate without administrator intervention.

Description of sslssoauthentn.gif follows
Description of the illustration sslssoauthentn.gif

Default usage for client certificates

The value you choose here appears as the selected usage when a client requests a certificate. This does not prevent the user from selecting a different usage from the drop-down list, which includes authentication, encryption, signing, and combinations of these, plus CA signing, and code signing.

This graphic is described in the preceding text.
Description of the illustration defaultusage.gif

Subject Alternate Name Extension

For SSO users, the value chosen for this extension appears in the certificate to enable email encryption, signing, or use by other applications. Your choices are shown below, in Extension Content Choice.

This graphic is described in the preceding text.
Description of the illustration sbjaltnamextn.gif

Extension Content Choice

Choose from None, Email, Principal Name (UID), or Email/Principal Name (UID). The choice made here appears in the certificate as the subject alternate name, enabling email encryption, signing, or use by other applications. (UID means user identifier or unique identifier.) Choosing "Email/Principal Name (UID)" causes both to be listed in the certificate.

Mandatory

If this box is checked, the Subject Alternate Name Extension is required for all SSO-authenticated certificates. If an email address or Principal Name cannot be found in Oracle Internet Directory for the user named in an SSO-authenticated certificate request, that request will be denied. An error message will state that an SSO-authenticated certificate could not be issued because an email account was not found in the Oracle Internet Directory, and that the requestor should contact the administrator.

Logging and Tracing

The choices in this section let you specify whether to create a log file of all user activities, a tracing file of all details for every error, or both.

Description of loggingntracing.gif follows
Description of the illustration loggingntracing.gif

Logs are stored in the OCA repository; you can view them from the View Logs tab. Trace is stored on the file system, in the file at $ORACLE_HOME/oca/logs/oca.trc.

Default Base DN Components

The values you fill in here will be used to pre-fill some of the Distinguished Name elements on the manual enrollment request form used to submit certificate requests.

Description of dnongeneral.gif follows
Description of the illustration dnongeneral.gif

This facility is simply for the users' convenience, supplying common fields. The values you fill in here can be overridden as needed.

Database Settings

The settings shown here tell you the database connect string, the database pool size, and the database pool scheme. The connect string is the one being used to connect to the OCA repository. You enter, in the Database Pool Size text box, the number of connections to the database (default: 20) that represents how many users you expect to access OCA concurrently. Specify a number slightly larger than what you expect; for example, if you expect about 25 concurrent users, specify 27 or 28 as the Database Pool Size. When a user in that pool of connections exits OCA, his connection becomes available to the next new user. For each user beyond that number, a new connection will be opened, to be closed as soon as that user has exited OCA.

In Database Pool Scheme, you choose how you want to treat connection requests that come in after all the connections you specified in Database Pool Size are in use. The default, "dynamic," means that a new connection is opened immediately for the new user, and after that user exits OCA, that connection is closed. If you choose"Fixed wait scheme", then after 20 users (or the number you specify) are connected to OCA, every subsequent user attempting to connect simply waits until one of the original 20 users exits. If you choose "Fixed Return Null," then after the original pool size limit is reached, each new user attempting to connect simply gets an error message. No new user can connect until an existing OCA user exits.

Description of databasesettings.gif follows
Description of the illustration databasesettings.gif

The database connect strings only change if OracleAS Certificate Authority's repository moves to a new location (or if a change is made directly to the connection string). Examples include changing the nodes or the port used for connection. In these cases, you can use the ocactl updateconnection command to update the repository connection settings, and then restart OCA to use the new connection information.

Directory Settings

The settings shown here simply tell you the host, agent, and port being used to connect with Oracle Internet Directory. If a change is made to the connection string, you can use the ocactl updateconnection command to update the repository connection settings, and then restart OCA to use the new connection information.

Description of directorysettings.gif follows
Description of the illustration directorysettings.gif

View Logs Tab

This configuration management page enables you to view logs that record messages regarding transactions or errors occurring during use of Oracle Application Server Certificate Authority. Such a screen would look like this:

Description of viewlogsnowhite.gif follows
Description of the illustration viewlogsnowhite.gif

Each line of such a log contains six elements, beginning with a log id number, the IP address that initiated the client activity, and the date of the action. Each line also includes the log entry type, the component of Oracle Application Server Certificate Authority generating the entry, and the component's message about the activity.

These logs can be searched, for example by client (IP) address or message content. The logs enable an administrator to learn where requests originated and what messages were issued for those requests. Searching enables review of specific message types, such as pertaining to rejections, and specific source IP addresses that may have initiated the actions that caused such messages.

Creating and Updating Your Certification Practice Statement

A certification practice statement describes the policies and procedures your site and certification authority follow, and thus often contains the following information:

You can add or alter your certification practice statement (CPS) by editing the $ORACLE_HOME/j2ee/oca/applications/ocaapp/oca/helpsets/Help/ocaadmin_cs_practicestmt.html file.

After Oracle Application Server Certificate Authority is restarted, your changes will appear on the Practice page when any user clicks the Practice Statement icon appearing on every page.


Note:

The Certificate Practice Statement created by the OCA administrator using the above procedure is not internationalization (i18n) compliant. This fact means that clients in a language different from the OCA server language will see the practice statement only in the server's language.

Certificate Practice Statements described by the OCA administrator using the above procedure is not internationalization (i18n) compliant. That means, the clients in a different language than the OCA server language will see the practice statement in server's language only.