Previous     Contents     Index     Next     
iPlanet Certificate Management System Installation and Setup Guide



Chapter 5   Installation Worksheet


This chapter provides a worksheet to help you prepare for installing a single instance of iPlanet Certificate Management Server (CMS). Print this chapter and make as many copies as you need. Fill out one copy for each CMS instance you plan to install and refer to it during the installation and configuration process. You should fill it in after you have read Chapter 4 "Planning Your Deployment" It is designed for easy reference while you are following the procedures described in Chapter 6 "Installing Certificate Management System."



Caution

Each completed worksheet contains sensitive information, such as passwords, that could severely compromise the security of your entire PKI if it falls into the wrong hands. Be sure to keep completed worksheets physically protected.



This chapter has the following sections:



Information for UNIX Installation Script

The information summarized here must be provided once for each server root installation on a UNIX system.


Installation Location

To install an instance of Certificate Management System, you must also install an Administration Server and iPlanet Console application and have access to a configuration and user/group directory. For more information on the iPlanet server environment, see Managing Servers with iPlanet Console.

  • Installation directory (Server root directory)_______________________________

    Enter the full pathname for the existing server root directory or for a new server root directory. For example, /usr/iplanet/servers.

  • Computer name_____________________________________________

    The default should be the fully qualified host name of the machine on which the installation is taking place. For example, mydirectory.siroe.com. Do not attempt to install remotely.


Configuration Directory Server

  • System user ID ________________________________

    Enter the user ID that Directory Server will run as. The configuration directory server process runs as this user. You should run the server as a user with restricted access to other system files and resources. Where your system supports it, accept the default user nobody, creating that user as necessary.

  • System group __________________________________________

    Enter a group to which the System User ID belongs. The group should also have limited access to system resources and files. Where your system supports it, accept the default user nobody, creating that group as necessary.

Do you want to register this software with an existing iPlanet configuration directory server?

  • Yes or No._______________

    If you choose No, the Installation Wizard will create a new instance of Directory Server for use as the configuration directory for this server root.

If you choose Yes, you must also supply the following information about the existing configuration directory:

  • Computer name_____________________________________________

    The default should be the fully qualified host name of the machine on which the configuration directory is located. For example, mydirectory.siroe.com.


User/Group Directory Server

Do you want to use another directory to store your data?

  • Yes or No._______________

If you choose No, the installation script either adds a user/group directory to the newly installed instance of Directory Server (if you answered no to the preceding question) or installs a new instance of Directory Server for use as a user/group directory.

If you choose Yes, you must also supply the following information:

  • User directory host name___________________________________________

  • User directory port_____________________________________________

  • Bind as_____________________________________________

  • User directory server suffix_____________________________________________

  • User directory administrator ID_____________________________________


Configuration Directory Settings

You need to provide the following information about the configuration directory, whether it is an existing one or a new one to be created by the Installation Wizard:

  • Directory Server network port ________________________

    Enter the port number for the Directory Server instance. The default is 389, if it is available, or a randomly selected number. The port number you specify must not be used for any other purpose.

  • Directory Server identifier______________________________________

    This unique identifier is required for each instance of a Directory Server. For example, configdir.

  • Configuration Directory Server Administrator ID________________________

    The ID for the user who will authenticate to iPlanet Console with full privileges. For example, diradmin1.

  • Configuration Directory Server Administrator Password___________________

    The password must be at least eight characters long.

  • Suffix ____________________________________

    Enter the domain name of the current host. For example, o=siroe.com.

  • Directory Manager DN ________________________

    Enter the distinguished name (DN) of the directory manager for the configuration directory.

    This DN can be short and does not need to conform to any suffix configured for your directory. It also should not correspond to an actual entry stored in your directory. For example, cn=Directory Manager.

  • Directory Manager password ________________________

    The password must be at least eight characters long.

  • Administration domain ________________________________________

    This domain name identifies the collection of servers that use the same configuration directory. For example, siroe.com


Administration Server Information

  • Administration Port___________________________________________

    The default Administration Port is randomly generated. Pick a port number between 1024 and 65535 on which to run your Administration Server, or accept the default number.

  • Run Administration Server as _____________________________

    Run the Administration Server as root if you want to be able to start and stop services and use port numbers below 1024 (for example to use port 80 for the HTTP end entity gateway).


Certificate Management System Identifier

You must specify a unique identifier for the CMS server instance that you are installing.

  • Certificate Management System server identifier___________________________

    Enter a unique identifier. For the name, you can use any combination of letters (aA to zZ), digits (0 to 9), an underscore (_), and a hyphen (-); other characters and spaces are not allowed. For example, you can type pilotCA , pilot_CA, or pilot-CA as the instance name, but not pilot CA.



Information for NT Installation Script

The information summarized here must be provided once for each server root installation.  


Installation Directory

To install an instance of Certificate Management System, you must also install an Administration Server and iPlanet Console application and have access to a configuration and user/group directory. For more information on the iPlanet server environment, see Managing Servers with iPlanet Console.

  • Installation directory (Server root directory)_______________________________

    The default installation directory is C:\iPlanet\Servers. If you want to use a different directory, enter the full pathname for the existing server root directory or for a new server root directory.

    You cannot install more than one server root directory on a Windows NT system.


Configuration Directory Server

Choose one of these options:

  • This instance will be the configuration directory server._____________________

    If you choose the above option, the Installation Wizard will create a new instance of Directory Server for use as the configuration directory for this server root.

  • Use existing configuration directory server._______________________________

    If you choose to use an existing configuration directory, you must supply the following information:

    • Host name___________________________________________

    • Port________________________________________________

    • Bind as______________________________________________

    • Password____________________________________________


User/Group Directory Server

Choose one of these options:

  • Store data in this directory server._______________________________________

    If you choose this option, the installation script either adds a user/group directory to the newly installed instance of Directory Server (if you have already decided to install a new configuration directory) or installs a new instance of Directory Server for use as a user/group directory.

  • Store data in an existing directory server._________________________________

    If you choose to use an existing directory, you must supply the following information:

    • Host name_____________________________________________

    • Port__________________________________________________

    • Bind as________________________________________________

    • Password______________________________________________

    • Suffix_________________________________________________


Configuration Directory Settings

You need to provide the following information about the configuration directory, whether it is an existing one or a new one to be created by the Installation Wizard:

  • Directory Server identifier_______________________________________

    This unique identifier is required for each instance of a Directory Server. For example, configdir.

  • Directory Server network port (default is 389)________________________

    Enter the port number for the Directory Server instance. The default is 389, if it is available, or a randomly selected number. The port number you specify must not be used for any other purpose.

  • Suffix ____________________________________

    If you are creating a new directory, this should be the domain name of the current host. For example, o=siroe.com.


Configuration Directory Server Administrator

  • Configuration Directory Server Administrator ID________________________

    For example, diradmin1.

  • Configuration Directory Server Administrator Password___________________

    The password must be at least eight characters long.


Directory Server Administration Domain

  • Administration domain ________________________________________

    This domain name identifies the collection of servers that use the same configuration directory. For example, siroe.com.


Directory Manager Settings

  • Directory manager DN ________________________

    Enter the distinguished name (DN) of the directory manager for the configuration directory.

    This DN can be short and does not need to conform to any suffix configured for your directory. It also should not correspond to an actual entry stored in your directory. For example, cn=Directory Manager.

  • Directory Manager password ________________________

    The password must be at least eight characters in length.


Administration Server Port

  • Administration Port-----------------___________________________________________

    Pick a port number between 1024 and 65535 on which to run your Administration Server, or accept the default number.


Certificate Management System Identifier

You must specify a unique identifier for the CMS server instance that you are installing.

  • Certificate Management System server identifier___________________________

    Enter a unique identifier. For the name, you can use any combination of letters (aA to zZ), digits (0 to 9), an underscore (_), and a hyphen (-); other characters and spaces are not allowed. For example, you can type cmsdemo, cms_demo, or cms-demo as the instance name, but not cms demo.



Initial Configuration

For each instance of Certificate Management System that you create, you use the Installation Wizard to supply information about that instance's configuration. The information described in this section is required for each CMS instance, regardless of which subsystems you decide to install.


Internal Database

For each instance of Certificate Management System, a new instance of iPlanet Directory Server is created on the local host to act as the internal (local) database. Each subsystem must have access to this local database to store certificates, certificate requests, keys, and other information. Certificate Management System uses LDAP to communicate with its local database.

  • Certificate Management System internal database instance ID_______________

    The default provided by the system is the CMS server identifier with the suffix -db; for example, cmsdemo-db.

  • Port number_______________

    The default is 38900, but you may choose any value less than 65535. On UNIX, you must choose a port greater than 1024 if you are not logged in as root.

  • Directory Manager DN ____________________________________________

    The default is CN=Directory Manager. You can enter something more meaningful, such as CN=Internal Directory Manager.

  • Internal database password_______________________________


Administrator

Specify the CMS administrator. This person will be able to access the CMS window of iPlanet Console and approve the first agent certificate.

  • CMS Administrator ID_____________________________________________

    For example, CMSadmin.

  • CMS Administrator full name________________________________

    For example, Certificate Management System Administrator.

  • CMS Administrator password________________________________


Subsystems

Choose the subsystems you will install in this instance. You can choose to install any individual manager, Certificate Manager and Data Recovery Manager together, or Registration Manager and Data Recovery Manager together. Other combinations are not allowed, for example, you cannot install a Certificate Manager and Registration Manager together or Certificate Manager and Online Certificate Status Manager together. The Certificate Manager can be configured to perform all Registration Manager functions, so it's not necessary or possible to install both managers in the same instance.

In addition to x.509 certificates, the Certificate Manager can also issue Wireless Transport Layer Security (wTLS)-compliant certificates for wireless applications. If you want this feature, you must choose the appropriate option. If you enable issuance of wTLS certificates, the Certificate Manager generates a wTLS CA signing certificate and installs the approriate HTML interfaces for users to request certificates for wireless applications.

  • Certificate Manager___________________________________

    Enable issuance of wTLS certificates? _____________________

  • Registration Manager__________________________________

  • Data Recovery Manager________________________________

  • Online Certificate Status Manager_________________________


Remote Certificate Manager

If you are installing a Registration Manager, you need to provide the following information about the Certificate Manager to which the Registration Manager sends certificate requests:

  • Host name for remote Certificate Manager_____________________________

  • SSL agent port for remote Certificate Manager__________________________


Remote Data Recovery Manager

If you are installing a standalone Certificate Manager or Registration Manager, and if you have already installed a remote Data Recovery Manager that you want the new manager to use, you need to provide the following information about the Data Recovery Manager:

  • Host name for remote Data Recovery Manager_________________________

  • SSL agent port for remote Data Recovery Manager______________________


Network Configuration

Enter numbers for the ports to be used for various kinds of communications. On UNIX, you must be root to assign ports less than 1024. The default values are well-known ports, which are used only if they are not already in use. If these defaults are not available, a randomly chosen port number is given as the default.

For a discussion of port assignments, see Deployment Strategy and Port Assignments in Chapter 3.

  • SSL administration port (HTTPS) (default is 8200)___________

  • SSL agent port (HTTPS) (default is 8100)__________________

  • SSL end-entity port (HTTPS) (default 443)_________________

  • Non-SSL end-entity port (HTTP) (default 80)_______________



Certificate Manager Configuration

This section summarizes information required to configure a Certificate Manager as a root or subordinate CA (either by itself or as part of a joint installation with a Data Recovery Manager).


CA Signing Certificate

When you install the Certificate Manager, you must supply information for the CA certificate that the Certificate Manager will use to sign the certificates it issues. This certificate also functions as the Certificate Manager's SSL client certificate.


CA's Serial Number Range

For most CAs, you only need to enter the starting serial number. When you configure cloned CAs, you must specify upper and lower bounds for the serial numbers on all CAs and you must make sure the ranges do not overlap.

  • CA's starting serial number _____________________

    Enter the lowest serial number available for this CA to assign to certificates it creates. You can enter the number in decimal or hexadecimal (0xnn). The default is 0x1.

  • CA's ending serial number __________________________

    Enter the highest serial number available for this CA. You can enter the number in decimal or hexadecimal (0xnn). The default is no upper limit (blank).


Key-Pair Information for CA Signing Certificate

For a discussion of related issues, see CA Signing Key Type and Length in Chapter 3.

  • Token for storing the Certificate Manager CA signing certificate and private key____________________________________

    Enter either internal (if you plan to use the internal/software token) or the name of an external token. If you are using an external token, you will need to install it before you run the Installation Wizard. In the wizard, you can select from a list of already installed and available tokens. For example, SmartCard.

  • Token password_________________________________________________

    The password for the token must be at least eight character long.

  • Key type_________________________________________________

    RSA or DSA.

  • Key length_______________________________________________

    Available key sizes for RSA are 512, 1024, 2048, 4096, or custom. Available key sizes for DSA are 512, 1024, or custom (must be in increments of 64 bit).

    In general, longer keys are considered to be cryptographically stronger than shorter keys. However, longer keys also require more time for signing operations.

  • Message Digest Algortihm (select one): SHA1___   MD2___   MD5_____

    Select the message digest algorithm to use for generating digital signatures on certificates.


Subject Name for CA Signing Certificate

For a discussion of issues related to the subject name, see CA's Distinguished NameYou may fill in the attribute template or simply enter the DN as a string of attribute-value pairsCA's Distinguished Name in Chapter 3.

  • Common Name (CN=) _____________________________________

  • Organizational Unit (OU=) ___________________________________

  • Organization (O=) ________________________________________

  • Locality (L=) _____________________________________________

  • State (ST=) ______________________________________________

  • Country (C=) ____________________________________________

    A DN is a series of name-value pairs that in combination uniquely identify an entity. The subject DN identifies the CA signing certificate. You are not required to enter all the values, but must enter the Organization (O), such as the name of your company. The Organization is required because its absence causes Netscape Communicator (version 4.6 or below) to crash. For more information about distinguished names, see Apendix A, "Distinguished Names," in CMS Plug-Ins Guide.


Validity Period for CA Signing Certificate

You can specify the validity period for a self-signed CA signing certificate only. The validity period for a subordinate CA signing certificate is determined by the issuing CA.

  • Validity period_________________________ to __________________________

    Enter beginning and ending dates for the certificate's validity period. The validity period for the CA signing certificate determines how soon you will have to renew the certificate, which can be a complex procedure. The default validity period is two years.


Extensions for CA Signing Certificate

You can specify the extensions for a self-signed CA signing certificate only. Extensions for a subordinate CA signing certificate are specified by the issuing CA.

The default settings should work for most deployments. If necessary, you can add and additional/custom extension by pasting its base-64 encoding in the space provided on this screen. For more information about extensions, see Appendix C, "Certificate and CRL Extensions" of CMS Plug-Ins Guide.

Confirm that you want to include the following extensions. Check off all that apply; defaults are indicated in parentheses.

  • Basic constraints (Yes)_____________

    • CA (Yes)_________

    • Certification path length (Null)_______________________

    The certificate chain path length, if specified, determines the maximum number of certificates in a chain, starting with the end-entity certificate. If you do not specify this attribute, the length of the chain is unlimited.

  • Netscape certificate type (Yes)_____________

    • SSL client (No)_________

    • Object-signing (No)_________

    • SSL server (No)_________

    • S/MIME CA (Yes)_________

    • S/MIME (No)_________

    • Object-signing CA (Yes)_________

    • SSL CA (Yes)_________

  • Authority Key Identifier (Yes) ________________

  • Subject Key Identifier (Yes) ________________

  • Key usage (No)_____________

    If you decide to include the key usage extension, the following key usage bits are set by default:

    • digitalSignature

    • keyCertSign

    • CRLSign

  • Additional Extension (No)___________________________

    To add extensions not included by default by Certificate Management System, you will need to paste the base-64 encoding of a sequence of extensions into the wizard.


CA Signing Certificate Request

If you are installing a subordinate CA, you need to specify where to send your request for a CA signing certificate.

If you are submitting your certificate request to a third-party CA, follow the instructions provided by that CA.

If you are submitting your certificate request to another Certificate Manager, you need to know its URL:

  • End-entity URL for issuing Certificate Manager___________________________

    Enter the URL for the end-entity gateway of the Certificate Manager that will issue the subordinate CA's signing certificate. For example, https://hostname:443/.



Registration Manager Configuration

This section summarizes information required to configure a Registration Manager (either by itself or as part of a joint installation with a Data Recovery Manager).


Registration Manager Signing Certificate Request

When you install a Registration Manager, you must supply information for the certificate that the Registration Manager will use to sign certificate requests. This certificate also functions as the Registration Manager's SSL client certificate. The Installation Wizard formulates a certificate request on the basis of information you provide. It is possible for the CA that issues the certificate to overrule some of your decisions.


Key-Pair Information for Registration Manager Signing Certificate

  • Token for storing the Registration Manager signing certificate and private key____________________________________

    Enter either internal (if you plan to use the internal token) or the name of an external token. If you are using an external token, you will need to install it before you run the Installation Wizard. In the wizard, you can select from a list of already installed and available tokens. For example, SmartCard. .

  • Token password_________________________________________________

    The password for the token must be at least one character long.

  • Key type_________________________________________________

    RSA or DSA.

  • Key length_______________________________________________

    Available key sizes for RSA are 512, 1024, 2048, 4096, or custom. Available key sizes for DSA are 512, 1024, or custom (in increments of 64 bits only).

    In general, longer keys are considered to be cryptographically stronger than shorter keys. However, longer keys also require more time for signing operations.

  • Message Digest Algortihm (select one): SHA1___   MD2___   MD5___

    Select the message digest algorithm to use for generating digital signatures on certificates.


Subject Name for Registration Manager Signing Certificate

  • Common Name (CN=) _____________________________________

  • Organizational Unit (OU=) ___________________________________

  • Organization (O=) ________________________________________

  • Locality (L=) _____________________________________________

  • State (ST=) ______________________________________________

  • Country (C=) ____________________________________________

    A DN is a series of name-value pairs that in combination uniquely identify an entity. The subject DN identifies the Registration Manager signing certificate. You are not required to enter all the values, but must enter the Organization (O), such as your company name. The Organization is required because its absence causes Netscape Communicator (version 4.6 or below) to crash. For more information about distinguished names, see Apendix A, "Distinguished Names," in CMS Plug-Ins Guide.


Registration Manager Signing Certificate Issuer

If you are submitting your certificate request to a third-party CA, follow the instructions provided by that CA.

If you are submitting your certificate request to another Certificate Manager, you need to know its URL:

  • End-entity URL for issuing a Certificate Manager__________________________

Enter the URL for the end-entity gateway of the Certificate Manager that will issue the Registration Manager's signing certificate. For example, http://hostname:17006.



Data Recovery Manager Configuration



This section summarizes information required to configure a Data Recovery Manager (either by itself or as part of a joint installation with a Certificate Manager or Registration Manager).



Note If you want to use hardware tokens for generating and storing Data Recovery Manager's key pairs, you'll need at least two tokens: one exclusively for the storage key pair and the other for the remaining key pairs. Be sure to install (and initialize, if required) these tokens before you start the Data Recovery Manager installation.




Transport Certificate


Key-Pair Information for Transport Certificate

For a discussion of issues related to key type and length, see CA Signing Key Type and Length in Chapter 3.

  • Token for storing the transport certificate signing certificate and private key________________________________________

    Enter either internal (if you plan to use the internal token) or the name of an external token. If you are using an external token, you will need to install it before you run the Installation Wizard. In the wizard, you can select from a list of already installed and available tokens. For example, SmartCard.

  • Token password_________________________________________________

    The password for the token must be at least one character long.

  • Key type_________________________________________________

    RSA or DSA.

  • Key length_______________________________________________

    Available key sizes for RSA are 512, 1024, 2048, 4096, or custom. Available key sizes for DSA are 512, 1024, or custom (in increments of 64 bits only).

    In general, longer keys are considered to be cryptographically stronger than shorter keys. However, longer keys also require more time for signing operations.

  • Message Digest Algortihm (select one): SHA1___   MD2___   MD5___

    Select the message digest algorithm to use for generating digital signatures on certificates.


Subject Name for Transport Certificate

  • Common Name (CN=) _____________________________________

  • Organizational Unit (OU=) ___________________________________

  • Organization (O=) ________________________________________

  • Locality (L=) _____________________________________________

  • State (ST=) ______________________________________________

  • Country (C=) ____________________________________________

    A DN is a series of name-value pairs that in combination uniquely identify an entity. The subject DN identifies the transport certificate. You are not required to enter all the values, but must enter the Organization (O), such as your company name. The Organization is required because its absence causes Netscape Communicator (version 4.6 or below) to crash. For more information about distinguished names, see Apendix A, "Distinguished Names," in CMS Plug-Ins Guide.


Validity Period for Transport Certificate

You can specify the validity period for a transport certificate only if you are installing the Certificate Manager and Data Recovery Manager at the same time and you want the Certificate Manager that you just installed issue the transport certificate. If the transport certificate is issued by a remote CA, its validity period is determined by the issuing CA.

  • Validity period______________________ to _______________________

    Enter beginning and ending dates for the transport certificate's validity period.


Extensions for Transport Certificate

You can specify the extensions for a transport certificate only if you are installing the Certificate Manager and Data Recovery Manager at the same time and you have decided to have the Certificate Manager that you just installed issue the certificate. If the transport certificate is issued by a remote CA, its extensions are determined by the issuing CA.

The default settings should work for most deployments. If necessary, you can add an additional extension by pasting its base-64 encoding in the space provided on this screen. For more information about extensions, see Appendix C, "Certificate and CRL Extensions" of CMS Plug-Ins Guide.

Confirm that you want to include the following extensions. Check off all that apply; defaults are indicated in parentheses.

  • Basic constraints (No)_____________

    • CA (No)_________

    • Certification path length (No)_______________________

    The certificate chain path length, if specified, determines the maximum number of certificates in a chain, starting with the end-entity certificate. If you do not specify this attribute, the length of the chain is unlimited.

  • Netscape certificate type ((No)_____________

    • SSL client (No)_________

    • Object-signing (No)_________

    • SSL server (No)_________

    • S/MIME CA ((No)_________

    • S?MIME (No)_________

    • Object-signing CA ((No)_________

    • SSL CA ((No)_________

  • Authority Key Identifier (Yes) ________________

  • Subject Key Identifier (No)

  • Key usage (No)_____________

    If you decide to include the key usage extension, the keyEncipherment key usage bit is set by default.

  • Additional Extension (No)___________________________

    To add extensions not included by default by Certificate Management System, you will need to paste the base64 encoding of a sequence of extensions into the wizard.


Transport Certificate Request

If you are obtaining your transport certificate from a remote CA, you need to know where to submit your certificate request.

If you are submitting your transport certificate request to a third-party CA, follow the instructions provided by that CA.

If you are submitting your certificate request to a Certificate Manager, you need to know its URL:

  • End-entity URL for issuing Certificate Manager___________________________

    Enter the URL for the end-entity gateway of the Certificate Manager that will issue the transport certificate. For example, http://hostname:17006.


Storage Key and Recovery Agent Configuration


Storage Key Creation

Specify the length of the key that the Data Recovery Manager uses to encrypt end-entity encryption keys for storage.

  • Storage key length___________________

    The options available are 512, 1024, 2048, or 4096.


Data Recovery Scheme—1

The number of agents you enter here is determined by your organization's policies with respect to data recovery. If you enter a larger number than the default of 2 for the number of recovery agents required to recover a key, you're reducing the chances of inappropriate recovery but increasing the complexity of the recovery process.

Decide how you want to set up your m of n data recovery scheme (n > m):

  • Number of recovery agents
    required to recover a key (m, default 2) _______________________________________

  • Total number of designated
    recovery agents (n, default 3)_______________________________________


Data Recovery Scheme—2

Specify user IDs and passwords for the total number of designated recovery agents (see preceding section):

  • User ID______________________ Password_________________________

  • User ID______________________ Password_________________________

  • User ID______________________ Password_________________________

  • User ID______________________ Password_________________________

  • User ID______________________ Password_________________________

  • User ID______________________ Password_________________________

  • User ID______________________ Password_________________________

  • User ID______________________ Password_________________________



Online Certificate Status Manager Configuration

This section summarizes information required to configure a Online Certificate Status Manager.


Online Certificate Status Manager Signing Certificate Request

When you install a Online Certificate Status Manager, you must supply information for the certificate that the Online Certificate Status Manager will use to sign OCSP responses. The Installation Wizard formulates a certificate request on the basis of information you provide. It is possible for the CA that issues the certificate to overrule some of your decisions.


Key-Pair Information for Online Certificate Status Manager Signing Certificate

  • Token for storing the Online Certificate Status Manager signing certificate and private key____________________________________

    Enter either internal (if you plan to use the internal token) or the name of an external token. If you are using an external token, you will need to install it before you run the Installation Wizard. In the wizard, you can select from a list of already installed and available tokens. For example, SmartCard.

  • Token password_________________________________________________

    The password for the token must be at least one character long.

  • Key type_________________________________________________

    RSA or DSA.

  • Key length_______________________________________________

    Available key sizes for RSA are 512, 1024, 2048, 4096, or custom. Available key sizes for DSA are 512, 1024, or custom (in increments of 64 bits only).

    In general, longer keys are considered to be cryptographically stronger than shorter keys. However, longer keys also require more time for signing operations.

  • Message Digest Algortihm (select one): SHA1___   MD2___   MD5___

    Select the message digest algorithm to use for generating digital signatures on certificates.


Subject Name for Online Certificate Status Manager Signing Certificate

  • Common Name (CN=) _____________________________________

  • Organizational Unit (OU=) ___________________________________

  • Organization (O=) ________________________________________

  • Locality (L=) _____________________________________________

  • State (ST=) ______________________________________________

  • Country (C=) ____________________________________________

    A DN is a series of name-value pairs that in combination uniquely identify an entity. The subject DN identifies the Online Certificate Status Manager signing certificate. For more information about distinguished names, see Apendix A, "Distinguished Names," in CMS Plug-Ins Guide.


Online Certificate Status Manager Signing Certificate Issuer

If you are submitting your certificate request to a third-party CA, follow the instructions provided by that CA.

If you are submitting your certificate request to another Certificate Manager, you need to know its URL:

  • End-entity URL for issuing a Certificate Manager__________________________

Enter the URL for the end-entity gateway of the Certificate Manager that will issue the Online Certificate Status Manager's signing certificate. For example, http://hostname:17006.



Cloned Certificate Manager Configuration



This section summarizes information required to configure a clone of a Certificate Manager. You must have installed the original Certificate Manager and installed or created a new CMS instance. You must copy the key3.db and cert7.db files from the config directory of the original server to the config directory of the cloned server. If you use a hardware token for key and certificate storage, you must copy any key or certificate data from the original token to a new token accessible to the cloned Certificate Manager.

You can clone a Certificate Manager instance to have two server processes perfoming the same CA functions using the same keys and certificates. Each cloned Certificate Manager, including the original, must only issue certificates with serial numbers that do not conflict with the serial numbers issued by other clones. Use the CA serial number range to make sure that the serial numbers used by a clone do not overlap with the serial number range of another clone (or the original server).

If the cloned Certificate Manager has the same hostname as the original server, the clone can use the same SSL server certificate. The SSL server certificate DN contains the hostname as the common name (CN) attribute, so a clone with a different hostname must enroll for a new SSL server certificate.


CA Signing Certificate

When you install the Certificate Manager, you must supply information for the CA certificate that the Certificate Manager will use to sign the certificates it issues. This certificate can also function as the Certificate Manager's SSL client certificate. If the clone uses a different hostname than the original CA, you will need to generate a new SSL server certificate.


CA's Serial Number Range

For most CAs, you only need to enter the starting serial number. When you configure cloned CAs, you must specify upper and lower bounds for the serial numbers on all CAs and you must make sure the ranges do not overlap.

  • CA's starting serial number __________________

    Enter the lowest serial number available for this CA to assign to certificates it creates. You can enter the number in decimal or hexadecimal (0xnn). The default is 0x1.

  • CA's ending serial number ____________________

    Enter the highest serial number available for this CA. You can enter the number in decimal or hexadecimal (0xnn). The default is no upper limit (blank).


Cloned Key and Certificate Material

If you do not use the copied key and certificate databases, the Certificate Manager will need to generate a new signing key and certificate; consequently, it will not be a clone.

  • Use existing key and certificate? ___________________

    Answer yes, otherwise you are creating a new Certificate Manager and not a clone.

  • Instance name of the original server ____________________________

  • Token name where copied keys are stored _______________________

  • Token password ___________________________________________


SSL Server Key and Certificate

If the clone uses the same hostname, you can use the same SSL server certificate and key copied from the original server. Otherwise, answer no and continue with the next section, SSL Server Certificate Configuration.

  • Use existing SSL server key and certificate? Yes____   No______

  • Instance name of the original server ____________________________

  • Token name where copied keys are stored _______________________

  • Token password ___________________________________________



SSL Server Certificate Configuration

When you install an instance of iPlanet Certificate Management Server, you must supply information for the SSL server certificate used by that instance to identify itself. The same SSL certificate is shared by all subsystems installed in that instance.


SSL Server Certificate


Key-Pair Information for SSL Server Certificate

  • Token for storing the SSL server certificate and private key__________________

    Enter either internal (if you plan to use the internal token) or the name of an external token. If you are using an external token, you will need to install it before you run the Installation Wizard. In the wizard, you can select from a list of already installed and available tokens. For example, SmartCard.

  • Token password_________________________________________________

    The password for the token must be at least one character long.

  • Key type_________________________________________________

    RSA or DSA.

  • Key length_______________________________________________

    For domestic versions of iPlanet Certificate Management Server, available settings for RSA are 512, 1024, 2048, 4096, or custom, and available settings for DSA are 512, 1024, or custom (in increments of 64 bits only).

  • Message Digest Algortihm (select one): SHA1___   MD2___   MD5___

    Select the message digest algorithm to use for generating digital signatures on certificates.


Subject Name for SSL Server Certificate

  • Common Name (CN=) _____________________________________

  • Organizational Unit (OU=) ___________________________________

  • Organization (O=) ________________________________________

  • Locality (L=) _____________________________________________

  • State (ST=) ______________________________________________

  • Country (C=) ____________________________________________

    A DN is a series of name-value pairs that in combination uniquely identify an entity. The subject DN identifies the CA signing certificate. You are not required to enter all the values, but must enter the Organization (O), such as your company name. The Organization is required because its absence causes Netscape Communicator (version 4.6 or below) to crash. For more information about distinguished names, see Apendix A, "Distinguished Names," in CMS Plug-Ins Guide.


Validity Period for SSL Server Certificate

You can specify the validity period for an SSL server certificate only if you are installing a Certificate Manager and you have decided to have that the Certificate Manager issue the certificate. If the SSL server certificate is issued by a remote CA, its validity period is determined by the issuing CA.

  • Validity period___________________ to __________________________

    Enter beginning and ending dates for the certificate's validity period.


Extensions for SSL Server Certificate

You can specify the extensions for an SSL server certificate only if you are installing a Certificate Manager and you have decided to have that local Certificate Manager issue the certificate. If the SSL server certificate is issued by a remote CA, its extensions are determined by the issuing CA.

The default settings should work for most deployments. If necessary, you can add an additional extension by pasting its base-64 encoding in the space provided on this screen. For more information about extensions, see Appendix C, "Certificate and CRL Extensions" of CMS Plug-Ins Guide.

Confirm that you want to include the following extensions. Check off all that apply; defaults are indicated in parentheses.

  • Basic constraints (No)_____________

    • CA (Nos)_________

    • Certification path length (No)_______________________

    The certificate chain path length, if specified, determines the maximum number of certificates in a chain, starting with the end-entity certificate. If you do not specify this attribute, the length of the chain is unlimited.

  • Netscape certificate type (Yes)_____________

    • SSL client (Yes)_________

    • Object-signing (No)_________

    • SSL server (Yes)_________

    • S/MIME CA (No)_________

    • S?MIME (No)_________

    • Object-signing CA (No)_________

    • SSL CA (No)_________

  • Authority Key Identifier (Yes) ________________

  • Subject Key Identifier (No)

  • Key usage (No)_____________

    If you decide to include the key usage extension, the following key usage bits are set by default:

    • digitalSignature

    • keyEncipherment

  • Additional Extension (No)___________________________

    To add extensions not included by default by Certificate Management System, you will need to paste the base64 encoding of a sequence of extensions into the wizard.


SSL Certificate Request

If you are obtaining your SSL server certificate from another CA, you need to know where to submit your certificate request.

If you are submitting your certificate request to a third-party CA, follow the instructions provided by that CA.

If you are submitting your certificate request to another Certificate Manager, you need to know its URL.

  • End-entity URL for issuing Certificate Manager___________________________

    Enter the URL for the end-entity gateway of the Certificate Manager that will issue the SSL server certificate. For example, http://hostname:17006.



Single Sign-On Password

Before you exit the Installation Wizard, it asks you to specify a single signon password. This password simplifies the way you subsequently sign on to iPlanet Certificate Management Server by storing the passwords for the internal database and tokens. Each time you log on, you're required to enter just this single password.

  • Single signon password__________________________________________


Previous     Contents     Index     Next     
Copyright © 2002 Sun Microsystems, Inc. All rights reserved.

Last Updated October 07, 2002