Sun ONE Portal Server, Secure Remote Access 6.1 Administrator's Guide |
Chapter 6
Working With CertificatesThis chapter explains the authentication mechanisms provided by the Sun ONE Secure Remote Access along with the necessary configuration information.
This chapter covers the following topics:
Certificate ManagementThe Secure Remote Access provides certificate-based authentication for remote users. Secure Remote Access uses Secure Sockets Layer (SSL) to enable secure communication. The SSL protocol enables secure communication between two machines.
Secure Remote Access also supports client authentication with Personal Digital Certificates (PDCs). PDCs are a mechanism to authenticate a user through SSL client authentication. With SSL client authentication, the SSL handshake ends at the gateway. The gateway extracts the user’s PDC and passes it to the authenticated server. This server uses the PDC to authenticate the user.
You can either use a certificate that is issued by a Certificate Authority (CA), or generate and use self-signed certificates.
Certificate FilesWhen Sun ONE Portal Server, Secure Remote Access is installed, a self-signed SSL certificate is created and installed if you have chosen to install a self-signed certificate. If you have chosen not to install a self-signed certificate, only the certificate database is created. Certificate related files are located in /etc/opt/SUNWps/cert/default. This directory contains 5 files by default. The files and their descriptions are listed in Table 6-1.
Trust AttributesThe trust attributes of a certificate provide information about:
There are three available trust categories for each certificate, expressed in this order: “SSL, email, object signing”. For the gateway component, only the first category is useful. In each category position, zero or more trust attribute codes are used.
The attribute codes for the categories are separated by commas, and the entire set of attributes is enclosed by quotation marks. For example, the self-signed certificate generated and installed during the gateway installation is marked "u,u,u" which means it is a server certificate (user certificate) as opposed to a root CA certificate.
The possible attribute values and the meaning of each value are listed in Table 6-2.
Certificate Authorities (CAs)Most well-known public CAs are already included in the certificate database. The following is the list of all the public CAs included by default, and their trust attributes. See "Modifying the Trust Attributes of a Certificate" for information on modifying the trust attributes of a public CA. Table 6-3 lists the most common Certificate Authorities with the trust attributes.
The certadmin ScriptWhen the Sun ONE Portal Server, Secure Remote Access is installed, a self-signed SSL certificate is created and installed.
You can use the certadmin script to do additional certificate administration such as:
gwcertutil
The certadmin script in InstallDir/SUNWps/bin/ is a script that wraps around the gwcertutil command for convenience. The certadmin script helps you carry out the conventional tasks related to certificate administration. For any additional functionality, use the gwcertutil command directly. For example, use gwcertutil to delete a certificate from the certificate database. The command gwcertutil -H lists usage.
Generating a Self-signed SSL CertificateSee “Generating Self-Signed Certificates” in Chapter 4, “Installing SSL Certificates” in the Sun ONE Portal Server, Secure Remote Access Installation Guide for details.
Obtaining and Installing an SSL Certificate From a CADuring the installation of the gateway component of the Secure Remote Access, a self-signed certificate is created and installed by default. At any point after installation, you can install SSL certificates signed by vendors who provide official certificate authority (CA) services, or by your corporate CA.
The three steps involved in this task are:
See “Installing Certificates from a Certificate Authority” in Chapter 4, “Installing SSL Certificates” in the Sun ONE Portal Server, Secure Remote Access Installation Guide for details.
Listing Root CA CertificatesTo View the List of Root CAs
where profilename is the name of the gateway instance.
The Certificate Administration menu is displayed.
List All CertificatesAll certificates and their corresponding trust attributes can be viewed by using the certificate administration script.
To List all the Certificates
- As root, run the certadmin script.
where profilename is the name of the gateway instance.
The Certificate Administration menu is displayed.
1) Generate Self-Signed Certificate
2) Generate Certificate Signing Request (CSR)
3) Add Root CA Certificate
4) Install Certificate From Certificate Authority (CA)
5) Modify Trust Attributes of Certificate (e.g., for PDC)
6) List Root CA Certificates
7) List All Certificates
8) Quit
choice: [8] 7
- Choose option 7 on the certificate administration menu.
Modifying the Trust Attributes of a CertificateOne case in which the trust attributes of a certificate needs to be modified is if client authentication is used with the gateway. An example of client authentication is PDC (Personal Digital Certificate). The CA that issues the PDCs must be trusted by the gateway, for example, the CA certificate should be marked "T" for SSL.
If the gateway component is set up to communicate with an HTTPS site that presents a self-signed certificate, allowing the gateway component to trust any unknown CAs can be a useful approach. However, for a serious deployment, this approach should be used with caution.
To Modify the Trust Attributes for a Certificate
- As root, run the certadmin script.
where profilename is the name of the gateway instance.
The Certificate Administration menu is displayed.
1) Generate Self-Signed Certificate
2) Generate Certificate Signing Request (CSR)
3) Add Root CA Certificate
4) Install Certificate From Certificate Authority (CA)
5) Modify Trust Attributes of Certificate (e.g., for PDC)
6) List Root CA Certificates
7) List All Certificates
8) Quit
choice: [8] 5
- Choose option 5 on the certificate administration menu.
- Enter the name of the certificate. For example, Thawte Personal Freemail C.
- Enter the trust attribute for the certificate.
The certificate trust attribute will be changed.