Complete Contents
About This Guide
PART 1: Netscape Certificate Management System
Chapter 1: Introduction to Certificate Management System
Chapter 2: Administration Tasks and Tool
Chapter 3: Configuration
PART 2: Managing Certificate Management System
Chapter 4: Installing and Uninstalling CMS Instances
Chapter 5: Starting and Stopping CMS Instances
PART 3: System-Level Configuration
Chapter 6: Configuring Ports, Database, and SMTP Settings
Chapter 7: Managing Privileged Users and Groups
Chapter 8: Keys and Certificates
PART 4: Authentication
Chapter 9: Introduction to Authentication
Chapter 10: Authentication Modules for End-Entity Enrollment
Chapter 11: Using the PIN Generator Tool
Chapter 12: Configuring Authentication for End Users
Chapter 13: Developing Custom Authentication Modules
PART 5: Job Scheduling and Notification
Chapter 14: Introduction to Job Scheduling and Notifications
Chapter 15: Configuring Schedulable Jobs
PART 6: Policies
Chapter 16: Introduction to Policy
Chapter 17: Constraints-Specific Policy Modules
Chapter 18: Extension-Specific Policy Modules
Chapter 19: Configuring a Subsystem's Policies
PART 7: Publishing
Chapter 20: Introduction to Publishing Certificates and CRLs
Chapter 21: Modules for Publishing Certificates and CRLs
Chapter 22: Configuring a Certificate Manager for Publishing
PART 8: Agent and End-Entity Interfaces
Chapter 23: Introduction to End-Entity and Agent Interfaces
Chapter 24: Customizing End-Entity and Agent Interfaces
PART 9: Logs
Chapter 25: Introduction to Logs
Chapter 26: Managing Logs
PART 10: Issuance and Management of End-Entity Certificates
Chapter 27: Issuing and Managing End-Entity Certificates
Chapter 28: Recovering Encrypted Data
PART 11: Appendixes
Appendix A: Distinguished Names
Appendix B: Backing Up and Restoring Data
Appendix C: Command-Line Utilities
Appendix D: Certificate Database Tool
Appendix E: Key Database Tool
Appendix F: Netscape Signing Tool
Appendix G: SSL Strength Tool
Appendix H: SSL Debugging Tool
Netscape Certificate Management System Administrator's Guide: Using the PIN Generator Tool
Previous Next Contents Index Bookshelf


Chapter 11 Using the PIN Generator Tool

For Netscape Certificate Management System (CMS) to use the plug-in module for directory-based authentication with PINs, your authentication directory must contain unique PINs for each end entity to whom you intend to issue a certificate. To aid you in generating PINs for end-entity entries in a directory, Certificate Management System provides a command-line tool called the PIN Generator. This tool allows you to generate unique PINs for entries in an LDAP-compliant user directory. The tool stores these PINs (as hashed values) in the same directory against the corresponding user entries, and it copies the PINs to a text file, from which you can deliver the PINs to end entities by an appropriate, secure means.

This chapter explains how to use the PIN Generator. The chapter has the following sections:


Locating the PIN Generator Tool
You can find the PIN Generator at this location:

<server_root>/bin/cert/tools/setpin.exe


The setpin Command
You run the PIN Generator by entering the setpin command and its arguments in a command shell and monitoring the output in the shell window. This section gives the syntax for the setpin command and its arguments. For instructions on generating PINs and storing them in your authentication directory, see "Step 2. Set Up the Directory for PIN-Based Enrollment".

Command-Line Syntax

Use the following command in a Unix or DOS command shell:

setpin [arguments]

setpin [optfile=filename] [param1] [param2]

Arguments

The setpin command takes the following arguments and options:

setpin

A description for each argument follows:

Example

The following command generates PINs for all entries that have the CN attribute (in their distinguished name) defined in an LDAP directory named laiking that is listening at port 19000. The PIN Generator binds to the directory as user DirectoryManager and starts searching the directory from the node dn=o=airius.com in the directory tree. The tool overwrites the existing PINs, if any, with the new ones.

setpin host=lailing port=19000 "binddn=CN=directoryManager" bindpw=password "filter=(cn=*)" basedn=o=airius.com clobber write


How the Tool Works
The Pin Generator allows you to generate PINs for user entries in an LDAP-compliant directory and update the directory with these PINs. To run the setpin command, you need at a minimum to specify the following:

For example:

setpin host=laiking port=19000 "binddn=CN=Directory Manager" bindpw=netscape "filter=(ou=employees)" basedn=o=siroe.com

This command, if run, will query the directory for all the entries that match the filter criteria, which in this case is all users belonging to an organizational unit (ou) called employees. For each entry matching the filter, information is printed out to standard error. Additionally, to the standard output or the file named in output; see "Output File".

You can also provide the tool with an input argument using the input option. The argument must be in the form of an ASCII file of pre-prepared DNs and PINs (see Figure 11.1). Note that the input file isn't a substitute for the LDAP directory entries; the filter attribute must still be provided. If an input file is provided, the tool updates only those filtered attributes that match the ones in the input file. For more information about the input file, see "Input File"

Figure 11.1 Using an input and output file for the PIN-generation process

Examples of output follow:

Processing: cn=QA Managers,ou=employees,o=airius.com

Adding new pin/password

dn:cn=QA Managers,ou=employees,o=airius.com

pin:lDWynV

status:notwritten

Processing: cn=PD Managers,ou=employees,o=airius.com

Adding new pin/password

dn:cn=PD Managers,ou=employees,o=airius.com

pin:G69uV7

status:notwritten

Because the PIN Generator makes a lot of changes to your directory, it is important that you specify the correct filter; otherwise, you may change the wrong entries. As a safeguard, a write option is provided that you use to enable writing to the directory after you verify the output; the tool doesn't make any changes to the directory until you specify the write option on the command line.

The output also contains the status of each entry in the directory. It can be one of the values specified in Table 11.1.

Table 11.1 PIN Generator status

Exit code
Description
notwritten
Specifies that the PINs were not written to the directory, because the write option was not specified on the command line.
writefailed
Specifies that the tool made an attempt to modify the directory, but the write operation was unsuccessful.
added
Specifies that the tool added the new PIN to directory successfully.
replaced
Specifies that the tool replaced an old PIN with a new one (the clobber option was specified).
notreplaced
Specifies that the tool did not replace the old PIN with a new one (the clobber option was not specified).

If a PIN already exists for a user, it will by default not be changed if you run the setpin command a second time. This is so that you can generate PINs for new users without overwriting PINs for users who have previously been notified of their PINs. If you want to overwrite a PIN, you should use the clobber option.

Once you are sure that the filter is matching the right users, you should run the setpin command again with the write option, and with output set to the name of the file to capture the unhashed PINs. This output file is in the same format as the input file. For details about the output file, see "Output File".

Input File

The PIN Generator can receive a list of DNs to modify in a text file specified by the input=<file_name> argument. If you specify an input file, the tool compares the DNs it filtered from the LDAP directory with the ones in the input file, and updates only those DNs that matched the ones in the input file.

The purpose of the input file is multifold. It enables you to provide the Pin Generator with an exact list of DNs to modify. Via the input file, you can also provide the PIN Generator with PINs (in plain text format) for all DNs or for specific DNs.

The following examples explain why you might want to use the input file:

The format of the input file is the same as that of the output file (see "Output File"), with the omission of the status line. In the input file, you can choose to specify PINs for all the DNs in the file, for specific DNs, or for none of the DNs. If the PIN attribute is missing for a DN, the tool automatically generates a random PIN.

For example, you can set up your input file to look like this:

You can also provide PINs, in plain-text format, for the DNs in the input file, which is then hashed according to the command-line arguments. For example, you can set up your input file to look like this:

Note You cannot provide hashed PINs to the tool.

Output File

The PIN Generator can capture the output to a text file specified by the output=<file_name> argument.

The captured output will contain a sequence of records and will be in the following format:

where

The first line in each record will always be the distinguished name. The subsequent lines, for pin and status, are optional. The record ends with a blank line. The end of line (EOL) sequence is as follows:

Windows NT \r\n

Unix \n

How PINs Are Stored in the Directory

Each PIN is concatenated with the corresponding user's LDAP attribute named in the saltattribute argument. If this argument is not specified, the DN of the user is used. Then, this string is hashed with the hash routine specified in the hash argument (the default selection is SHA-1).

Then, one byte is prepended to indicate the hash type used. Here's how the PIN gets stored:

byte[0] = X

The value of X depends on the hash algorithm chosen during the PIN generation process:

X=0 if the hash algorithm chosen is SHA-1.

X=1 if the hash algorithm chosen is MD5.

X=45 if the hash algorithm chosen is none.

byte[1...] = hash("DN"+"pin")

The PIN is stored in the directory as a binary value, not as a base-64 encoded value.

Exit Codes

The PIN Generator returns exit codes to the shell window; for a list of codes, see Table 11.2. If you plan on automating the PIN-generation process, exit codes are useful in programming shell scripts.

Table 11.2 Exit codes returned by the PIN Generator

Exit code
Description
0
Indicates that PIN generation was successful; that is, PINs are set for all the DNs in the specified directory.
2
Indicates that the tool could not open the certificate database specified by the certdb parameter.
3
Indicates that the tool could not locate the certificate specified by the nickname parameter in the specified certificate database.
4
Indicates that the tool could not bind to the directory as the user specified by the binddn parameter (over SSL).
5
Indicates that the tool could not open the output file specified by the output parameter.
7
Indicates an error parsing command-line arguments.
8
Indicates that the tool could not open the input file specified by the input parameter.
9
Indicates that the tool encountered an internal error.
10
Indicates that the tool found a duplicate entry in the input file specified by the input parameter.
11
Indicates that the tool didn't find the salt attribute, specified by the saltattribute parameter, in the directory.

 

© Copyright © 2000 Sun Microsystems, Inc. Some preexisting portions Copyright © 2000 Netscape Communications Corp. All rights reserved.