Netscape Certificate Management System 4.2

Last updated on November 1, 2002

These release notes contain important information about Netscape Certificate Management System, version 4.2. Please read these notes before using the product. Use of this product is subject to the terms detailed in the license agreement accompanying it.

Note: The name of the product has been changed to iPlanet Certificate Management System and the product-download site (http://www.iplanet.com/downloads/download/) identifies the product as iPlanet Certificate Management System 4.2. The name change is not reflected in the documentation or in the software.


Contents

What's New in This Release
CMS Documentation
Software/Hardware Requirements
Installation Procedure
Upgrade From Certificate Management System 4.1x
Important Notes and Known Bugs
Contact Information
Change History


What's New in This Release

This section compares Certificate Management System, version 4.2 with Certificate Management System, version 4.1 (for the benefit of CMS 4.1 users). Topics include:

Supported Operating Systems

The table below summarizes the operating system/platform support for Certificate Management System 4.2 (and Certificate Management System 4.1).
 
Platform/OS CMS 4.2 CMS 4.1
Sun Solaris
  • Version 2.6, 2.7, and 8
  • Version 2.5.1 and 2.6
Windows NT
  • Version 4.0 with Service Pack 4, 5, or 6
  • Version 4.0 with Service Pack 4 and NTFS
Compaq Tru64 
  • Version 4.0D
  • Not supported
AIX
  • Version 4.3
  • Not supported
HP-UX
  • Version B.11.00
  • Not supported

Other Packages

The table below summarizes other components and packages integrated with Certificate Management System 4.2 (and Certificate Management System 4.1).
 
Other Components CMS 4.2 CMS 4.1
CMS SDK and Samples Are installed with the rest of the server binaries:
  • SDK (Java docs) can be found in the  <server_root>/cms_sdk/sdkdocs directory
  • Sample code is in the <server_root>/cms_sdk/samples directory
  • Includes more samples
  • Includes samples that generate BASE-64 encoded blobs for standard extensions for inclusion in CA/other certificate requests
Are contained in a directory named CMS_SDK:
  • If you downloaded the CMS binaries from the web site, you will find the CMS_SDK directory where you unpacked/unzipped the binaries (in the same directory in which the setup program is located).
  • If you installed Certificate Management System from a CD, check the CD for the CMS_SDK directory.
CMS Documentation List of documentation is available after installation at: <server_root>/manual/index.html List of documentation is available after installation at: <server_root>/manual/index.html
Netscape Administration Server
  • Uses version 4.2
  • Uses version 4.1
Netscape Directory Server
  • Uses version 4.12
  • Uses version 4.1
Netscape Console
  • Uses version 4.2
  • Uses version 4.1
Netscape Personal Security Manager Includes an Alpha build of the Dual-Key Test Bed or Personal Security Manager for Communicator 4.5 in the domestic version of the Certificate Management System.
Network Security Services (NSS)
  • Uses version 2.8.3, which supports 4096 bit key generation (RSA only) for Certificate Manager signing, Registration Manager signing,  Data Recovery Manager transport, and SSL server certificates.
  • This version has been enhanced to make cryptographic accelerators work more efficiently.
  • For details about the NSS project, see http://www.mozilla.org/projects/security/pki/nss/
  • Uses version 2.6
  • Uses NSS for SSL, Certificate Manager signing certificate, and CRL signing.
  • Does not use NSS for random number generation yet.
ValiCert Certificate VATM
  • Included for setting up a local online validation authority (or an OCSP responder). Check this directory: <server_root>/cva301
  • Does not include this.

Features

The table below compares Certificate Management System 4.2 features to that of Certificate Management System 4.1. The new features implemented in CMS 4.2 are in bold.
 
Feature CMS 4.2 CMS 4.1
Authentication methods for end users
  • Manual
  • LDAP directory-based
  • LDAP Directory and PIN-based
  • NIS server-based authentication (with LDAP correlation for formulating subject name)
  • Portal authentication
  • Certificate-based
  • Manual
  • LDAP directory-based
  • Directory and PIN-based
Forms for certificate enrollment
  • User enrollment:
    • Manual (ManUserEnroll.html)
    • LDAP directory-based (DirUserEnroll.html)
    • LDAP directory- and PIN-based (DirPinUserEnroll.html)
    • NIS server-based (NISUserEnroll.html)
    • Portal (PortalEnrollment.html)
    • Certificate-based (CertBasedDualEnroll.html, CertBasedEncryptionEnroll.html, and CertBasedSingleEnroll.html)
  • Server enrollment:
    • Manual (ManServerEnroll.html)
  • Certificate Manager/CA enrollment:
    • Manual (ManCAEnroll.html)
  • Registration Manager enrollment:
    • Manual (ManRAEnroll.html)
  • Object Signing Certificate enrollment:
    • Manual (ManObjSignEnroll.html and ObjSignPKCS10Enroll.html)
  • OSCP Responder Certificate enrollment:
    • Manual (OCSPResponder.html)
  • User enrollment:
  • Manual (ManUserEnroll.html)
  • LDAP directory-based (DirUserEnroll.html)
  • LDAP directory- and PIN-based (DirPinUserEnroll.html)
  • Server enrollment:
  • Manual (ManServerEnroll.html)
  • Certificate Manager/CA enrollment:
  • Manual (ManCAEnroll.html)
  • Registration Manager enrollment:
  • Manual (ManRAEnroll.html)
  • Object Signing Certificate enrollment:
  • Manual (ManObjSignEnroll.html)
  • Forms for certificate renewal
    • SSL client-authenticated renewal of end-user certificates
    • Manual for other certificates, for example, SSL server certificate and Registration Manager signing certificate
    • SSL client-authenticated renewal of end-user certificates
    • Manual for other certificates, for example, SSL server certificate and Registration Manager signing certificate
    Forms for certificate revocation
    • SSL client-authenticated revocation of end-user certificates
    • Challenge password-based revocation of end user certificates requested using the manual enrollment form
    • SSL client-authenticated revocation of end-user certificates
    Policies for governing the formulation of certificates Constraints-specific policies:
    • Attribute Present Constraints policy
    • DSA Key Constraints policy
    • Issuer Constraints policy
    • Key Algorithm Constraints policy
    • Renewal Constraints policy
    • Renewal Validity Constraints policy
    • RSA Key Constraints policy
    • Revocation Constraints policy
    • Signing Algorithm Constraints policy
    • Subordinate CA Name Constraints policy
    • Unique Subject Name Constraints policy
    • Validity Constraints policy
    Constraints-specific policies:
    • Default Revocation policy
    • DSA Key Constraints policy
    • Key Algorithm Constraints policy
    • Renewal Constraints policy
    • Renewal Validity Constraints policy
    • RSA Key Constraints policy
    • Revocation Constraints policy
    • Signing Algorithm Constraints
    • Unique Subject Name policy
    • Validity Constraints policy
    Policies for adding certificate extensions Extension-specific policies with ability to set the 'critical' flag (except for the Netscape Certificate Type policy, all other CMS 4.1 policies have been modified):
    • Authority Information Access policy
    • Authority Key Identifier policy
    • Basic Constraints policy
    • Certificate Comment policy
    • Certificate Renewal Window policy
    • Certificate Scope of Use policy
    • CRL Distribution Points policy
    • Extended Key Usage policy
    • Generic ASN-1 Type Extension policy
    • Issuer Alternative Name policy
    • Key Usage policy (bits can set on both client and server side)
    • Name Constraints policy
    • Netscape Certificate Comment policy
    • Netscape Certificate Type policy
    • OCSPNoCheck policy
    • Policy Constraints policy
    • Policy Mappings policy
    • Private Key Usage Period policy
    • Subject Alternative Name policy
    • Subject Directory Attributes policy
    • Subject Key Identifier policy
    Extension-specific policies:
      • Authority Key Identifier policy
      • Basic Constraints policy
      • CRL Distribution Points policy
      • Key Usage policy (bits can set on the client side only)
      • Netscape Certificate Type policy
      • Subject Alternative Name policy
      • Subject Key Identifier policy
    Schedulable jobs
    • Same as 4.1
    • Directory update and notification (for removal of expired certificates from the directory)
    • Certificate renewal notifications to end entities
    • Request-queue-status notification
    Event-driven notifications
    • Certificate-issued notification to end entities
    • Request-in-queue notification to agents
    • New PIN-removal listeners
    • Certificate-issued notification to end entities
    • Request-in-queue notification to agents
    Publishing of certificates and CRLs
    • Improved UI
    • Pluggable architecture for mapper and publisher classes
    • Supports publishing of certificates to 
      • An LDAP directory
      • A flat file (for importing certificates into other repositories)
    • Supports publishing of CRLs to
      • An LDAP directory 
      • A flat file (for importing CRLs into other repositories)
      • An online validation authority (an OCSP responder)
    • Mapper plug-in modules: 
      • Flexible mapper that uses DNComps, filterComps, and baseDN for mapping certificates to directory entries
      • Mapper that looks for the certificate’s subject name in an entry
      • Simple Mapper that accepts a DN pattern for mapping certificates to directory entries
      • Mapper that uses DNComps, filterComps, and baseDN for locating CA's entry for publishing the CRL
      • Mapper that creates an entry for the CA in the directory 
    • Publisher plug-in modules:
      • Publisher that publishes/unpublishes a certificate to the caCertificate;binary attribute of the mapped directory entry as a DER encoded binary blob
      • Publisher that publishes/unpublishes a certificate to the userCertificate;binary attribute of the mapped directory entry as a DER encoded binary blob
      • Publisher that  publishes (replaces) a CRL to the certificateRevocationList;binary attribute of the mapped directory entry
      • Publisher that  publishes or unpublishes certificates and CRLs to a flat file to exporting into other repositories
      • Publisher that  publishes or unpublishes the CRL to ValiCert Certificate Validation Authority™ server
  • Supports publishing of certificates and CRLs to an LDAP directory
  • Mapper plug-in modules:
  • Flexible mapper that uses DNComps, filterComps, and baseDN for mapping entries
  • Publisher plug-in modules:
  • Publisher that publishes/unpublishes a certificate to the caCertificate;binary attribute of the mapped directory entry as a DER encoded binary blob
  • Publisher that publishes/unpublishes a certificate to the userCertificate;binary attribute of the mapped directory entry as a DER encoded binary blob
  • Logging
    • System and error logs for monitoring/troubleshooting
    • Audit log for auditing server activities
    • Signed log archives
    • UI for configuring/monitoring system, error, and audit logs
    • UI for Windows NT Event Log configuration
    • System and error logs for monitoring/troubleshooting
    • Audit log for auditing server activities
    • Signed log archives
    • UI for configuring/monitoring system, error, and audit logs
    Backup and recovery
    • Perl-script based, interactive command-line tools
    • Had to copy files manually
    Certificate Manager
    • Certificate Enrollment
    • Browser Types
      • Netscape Communicator 4.x
      • Microsoft Internet Explorer (IE) 4.x
    • Key Type Supported: RSA and DSA
    • Key Length Supported: 512-4096 bits (RSA) and 512-1024 bits by 64-bit increments (DSA)
    • Signing Algorithms Supported: MD2 with RSA, MD5 with RSA, and SHA-1 RSA, if the CA key type is RSA; SHA-1 DSA, if the CA key type is DSA.
    • CA Signing Certificate (defaults)
      • Validity: 2 years
      • Key type: RSA
      • Key length 512 bits
      • Hash algorithm: SHA-1 with RSA
      • Extensions: Basic Constraints, Netscape Certificate Type (SSL CA, S/MIME CA, and object-signing CA bits are set), Authority Key Identifier, and Subject Key Identifier
    • CRL Publishing (default)
      • Directory: unspecified; requires configuring
      • Interval: every time a certificate is revoked and at every 20 minutes
      • Version: 1 (that is, no extensions are included)
      • Signing algorithm: MD5 with RSA
      • CRL doesn't include revoked certificates
    • Certificate Signing Policy (default)
      • Validity period: minimum 30 days, maximum 365 days
      • Certificate version: v3
    • URL for End-Entity Certificate Enrollment
      • Go to http://<host_name>:<non-SSL port> or https://<host_name>:<SSL port>, then select End User Services.
    • Certificate Enrollment
    • Browser Types
      • Netscape Communicator 4.x
      • Microsoft Internet Explorer (IE) 4.x
    • Key Type: RSA and DSA
    • Key Length Supported: 512 to 2048 bits
    • Signing Algorithms Supported: MD2 with RSA, MD5 with RSA, and SHA-1 RSA, if the CA key type is RSA; SHA-1 DSA, if the CA key type is DSA.
    • CA Signing Certificate (default)
      • Validity: 2 years
      • Key type: RSA
      • Key length 512 bits
      • Hash algorithm: SHA-1 with RSA
      • Extensions: Basic Constraints, Netscape Certificate Type (SSL CA, S/MIME CA, and object-signing CA bits are set), Authority Key Identifier, and Subject Key Identifier
    • CRL Publishing (default)
      • Directory: unspecified; requires configuring
      • Interval: every time a certificate is revoked and at every 20 minutes
      • Version: 1 (that is, no extensions are included)
      • Signing algorithm: MD5 with RSA
      • CRL doesn't include revoked certificates
    • Certificate Signing Policy (default)
      • Validity period: minimum 30 days maximum 365 days
      • Certificate version: v3
    • URL for Enrollment
      • Go to http://<host_name>:<non-SSL port> or https://<host_name>:<SSL port>, then select End User Services.
           
    Registration Manager
    • Publishing of certificates to an LDAP directory has been removed.
    • Supported publishing of certificates to an LDAP directory
    Key Recovery Manager
    • The installation wizard fills default IDs for Key Recovery Agents; you can overwrite the default values. 

    Agent Services interface
    • Supports listing of pending requests based on the request type, such as certificate enrollment, renewal, and revocation. 
    • The certificate-request form (processReq.templete) includes a text field for pasting any standard/custom extension in MIME-64 encoded format. (The samples directory includes tools for generating standard extensions in this format.)


    CMS Documentation

    You can find CMS documentation in the directory named Docs at the top level of the CD. For installation instructions, see Netscape Certificate Management System Installation and Deployment Guide, available as a PDF file at Docs/cms42install.pdf. For a summary of the other CMS documentation that is available prior to installation, see Docs/docs_readme.html.

    After you run the setup script as described under Installation Procedure, see the file below for a complete list of the documentation installed with the product: <server_root>/manual/index.html

    If you are working with files you have downloaded from the web site (http://www.iplanet.com/downloads/download/index.html), as opposed to the files on the CD, the Docs directory mentioned above will not be present. Instead, you must first run the setup script, then check this file for the documentation: <server_root>/manual/index.html

    For the latest information about Certificate Management System, including current release notes, technical notes, and deployment information, check this URL: http://docs.iplanet.com/docs/manuals/cms.html


    Software/Hardware Requirements

    Operating Systems Supported
  • Windows NT 4.0 with Service Pack 4, 5, or 6
  • Solaris 2.6, 2.7, or 8
  • Compaq Tru64 v4.0D
  • AIX 4.3
  • HP-UX B.11.00
  • Other Required Software  Platform and Hard Disk Requirements
    In addition to the requirements listed below, make sure you have ample swap space or virtual memory allocated for the system on which you intend to install Certificate Management System.
     
    Solaris Platform Requirements
    OS Version Solaris 2.6, 2.7, or 8
    Machine Ultra 1 or faster
    RAM 128 MB (required)
    Hard disk storage space requirements Total required is approximately 400 MB, as follows:
    • Total transient space required during installation: 100 MB
    • Hard disk storage space required for installation:
      • Space required for setup, configuration, and running the server: approximately 250 MB
      • Additional space to allow for database growth in pilot deployment: approximately 50 MB
      • Total disk storage space for installation: approximately 300 MB
    Windows NT Platform Requirements
    OS Version Windows NT 4.0 with Service Pack 4, 5, or 6
    Machine Pentium 166 or faster
    File system NTFS or FAT
    RAM 128 MB of RAM (recommended)
    Hard disk storage space requirements Total required is approximately 350 MB, as follows:
    • Total transient space required during installation: 100 MB
    • Hard disk storage space required for installation:
      • Space required for setup, configuration, and running the server: approximately 200 MB
      • Additional space to allow for database growth in pilot deployment: approximately 50 MB
      • Total disk storage space for installation: approximately 250 MB
    Other Requirements
    • On Unix systems, you must install as root in order to use well-known port numbers (such as 443) that are less than 1024. If you do not plan to use port numbers less than 1024, you do not need to install as root. If you plan to run as root, you should also install as root and specify nobody as the default run-as user and group.
    • On a Windows NT system, you must install as Administrator or a user with Administrator privileges (that is, the user must be in the Administrators group).


    Installation Procedure


    Upgrade From Certificate Management System 4.1x

    If you have an existing installation of Certificate Management System 4.1x, you can upgrade to Certificate Management System 4.2 by installing CMS 4.2 into the same server root. When prompted to specify the instance name, you must enter the name of the CMS instance that you want to upgrade. If the specified CMS instance exists in the selected server root, the installation program recognizes the instance and updates the existing configuration automatically. Note that during installation, you must specify the same port numbers that are in use by existing services, such as the Administration Server port for Netscape Console. If you have multiple CMS instances under the same server root, you must run the installation program for each instance. [# 393208]

    When you run the installation program for upgrading a CMS 4.1x instance, you will be presented with the following panels (the example below lists the panels on UNIX):

    Note the following: During the upgrade process, the internal database indexes do not get updated automatically. As an administrator, you can update the indexes manually. Updating of indexes is optional; searching performance will be improved greatly if the indexes are upgraded. [# 394283]

    Step 1. Stop Certificate Management System.
    Step 2. Update the basic indexes.
         To do this, make sure the following indexes are specified in the
         <server_root>/slapd-<instance_id>-db/config/slapd.ldbm.conf file:

      index description eq,pres
      index serialno eq,pres
      index subjectname eq,pres,sub
      index certstatus eq,pres
      index extension eq,pres,sub
      index revinfo eq,pres,sub
      index revokedby eq
      index issuedby eq
      index requestid eq,pres
      index requesttype eq,pres
      index requeststate eq,pres
      index notbefore eq,pres
      index notafter eq,pres
      index ownername eq,pres
      index publickeydata eq,pres
      index duration eq,pres
      index dateOfCreate eq,pres
      index revokedOn eq,pres
      index publickeydata eq,pres
      index archivedby eq,pres
    Step 3. Update the VLV indexes.
    1. Go to this directory: <server_root>/slapd-<instance_id>-db
    2. Perform the following command for each installed subsystem (that is, the Certificate Manager, Registration Manager, and Data Recovery Manager):
      ../shared/bin/ldapmodify -h <HOSTNAME> -p <PORT_OF_SLAPD_INSTANCE> -D <DN_OF_DIRECTORY_MANAGER> -w <PASSWORD> -c -a -f <INDEX_FILE>
      where <INDEX_FILE> is as follows:

      <server_root>/bin/cert/install/42-ca-vlv.ldif for the Certificate Manager
      <server_root>/bin/cert/install/42-ra-vlv.ldif for the  Registration Manager
      <server_root>/bin/cert/install/42-kra-vlv.ldif for the Data Recovery Manager

      For example, if you have a CMS instance with Certificate Manager and Data Recovery Manager, your command would look similar to this:

      ../shared/bin/ldapmodify -h certificate.siroe.com -p 38900 -D "cn=directory manager" -w "pwd1234" -c -a -f d:\netscape\server4\bin\cert\install\42-ca-vlv.ldif

      ../shared/bin/ldapmodify -h certificate.siroe.com -p 38900 -D "cn=directory manager" -w "pwd1234" -c -a -f d:\netscape\server4\bin\cert\install\42-kra-vlv.ldif

      (You might see some warning messages because some of the indexes were
      created in CMS 4.1 installation.)

    Step 4. Stop the corresponding internal database (that is, slapd-<instance_id>-db).
    Step 5. Export the database by running the following command:
            ./db2ldif

      This command will create a file in ldif sub-directory, and the timestamp is used as the filename.

    Step 6. Import the database so that indexes are re-built:
      ./ldif2db -noconfig -i <server_root>/slapd-<instance_id>-db/ldif/<timestamp>.ldif
    Step 7. Start up the corresponding internal database.

    Step 8. Start Certificate Management System.


    Important Notes and Known Bugs

    This section lists important notes, bugs, and known issues, and provides workarounds for some of the problems that you may encounter with the product. (The problems are identified by bug numbers to help you refer to them if you need to contact technical support.)

    Administration Server

    Authentication

    Backup and Restore

    Browser

    CA Cloning

      1. Configure the CAClone1 instance by running the Certificate Setup Wizard.
      2. Locate the configuration file, CMS.cfg, for the CAClone1 instance and open it in a text editor.
      3. Locate this line: agentgateway.enableAdminEnroll=true
      4. Edit the line so it looks like this: agentgateway.enableAdminEnroll=false

      5. This will change CAClone1 in to a mode where it expects a certificate (that was already issued and chains properly) to be presented when you access its agent interface.
      6. Restart the CAClone1 instance.
      7. Use Netscape Console and open the CMS Window for the CAClone1 instance.
      8. Go to the "Users and Groups" section, create a new agent user, and associate the agent certificate of CA with the new agent. To add the correct certificate, check the serial number of the CA's agent certificate (this certificate should already exist in one of the browsers that you use to access CA's agent interface) and search for it in the CA's certificate repository. Once you locate the certificate, paste the certificate (in its base-64 encoded form) in as the agent certificate in CAClone1.
      9. After creating the agent entry for CAClone1, go to https://<CAClone1 hostname>:<agent port> to verify that you can access its agent interface successfully.

    CEP Support

    CGI Support

    You can configure Certificate Management System to run CGI scripts by putting the CGI script (or executable) in a directory under the end-entity gateway's doc-root (<server_root>/cert-<instance_id>/web/ee) or agent gateway's doc-root  (<server_root>/cert-<instance_id>/web/agent), and by editing the configuration file to include information about the CGI script. [# 384101]

    To configure the server to run a CGI script:

    1. Stop Certificate Management System.
    2. Go to this directory: <server_root>/cert-<instance_id>/web/ee
    3. Create a directory for putting your CGI script, for example, cgi-bin.
    4. Copy your CGI script to the cgi-bin directory.
    5. Change to this directory: <server_root>/cert-<instance_id>/config
    6. Open the configuration file, CMS.cfg, in a text editor.
    7. Add the following lines:

    8. eeGateway.servletName.CGI=com.netscape.certsrv.http.CgiServlet
      eeGateway.servletAlias./cgi-bin=CGI
      In this example, any file under the cgi-bin directory, or any path starting with /cgi-bin/ in the eeGateway will be executed as a CGI.
    9. Save your changes.
    10. Close the file.
    11. Restart Certificate Management System.

    CRLs

    Custom Plug-in Modules

    Directory Server

    DSA

    Enrollment

    Enterprise Server

    Extensions

    Hardware Tokens

    Installation

    Internationalization

    Job Scheduling/Notification

    JSS

    Logging

    Migration Tool

    Miscellaneous

    Performance

    Personal Security Manager

    Policies

    Publishing

    Remote Registration Manager

    Renewal of CMS Certificates

    Request Queue Processing

    Revocation

    Samples and SDKs

    Scalability/Sizing

    Searching for Certificates

    Starting/Stopping the Server

    Third-Party Products

    RSA Security ServerTM

    ValiCert Certificate VATM

    SHYM PKEnableTM

    SHYM PKEnable Version 2.x software was tested with Certificate Management System 4.2 and the following problems were found [# 394951]:

    Check Point VPN-1TM

    UI (Netscape Console/CMS Window)


    Contact Information

    Your feedback is welcome and extremely helpful for improving the product. Before contacting us to request assistance, please check the documentation at this site:
    http://docs.iplanet.com/docs/manuals/cms.html
    If you need further assistance or information about Certificate Management System, please contact technical support. For information, check this site:
    http://www.iplanet.com/support/index.html
    You may also contact us through our newsgroup for support, questions, answers, and the latest information:
    snews://secnews.netscape.com/netscape.dev.certificate
    You might also find it useful to subscribe to the following newsgroups, where security-related topics are discussed:
    snews://secnews.netscape.com/netscape.dev.ssl
    snews://secnews.netscape.com/netscape.dev.security
    When reporting problems, please include the following: For problems involving the use of certificates issued by Certificate Management System in other products, include the product name (for example, Netscape Communicator), the release number, and platform information for those products as well.

    Change History

    The table below chronicles the changes made to the release notes.
     
    When Where What's been changed/added
    09/13/2000 Supported Operating Systems Changed 'OSF/1' to 'Compaq Tru64' and 'Solaris 2.8' to 'Solaris 8'.
     -- " --  CEP Support Automated enrollment with CEP fails. [# 511839]
    -- " -- Remote Registration Manager If either the root CA or subordinate CA certificate doesn't have an O= in the subject name, the Registration Manager setup will fail. [# 512054]
    10/11/2000  -- Details about the bugs that're addressed in the patch, cms42-sp1.zip available at http://www.iplanet.com/downloads/patches.
    -- " -- CA Cloning Problem generating the SSL server certificate when cloning of a CA on another machine. [# 503641]
    -- " -- CEP Support Automated enrollment with CEP fails [# 511839]; requests with no challenge password result in 'pending' response. [# 517187]; the deferOnFailure preference is not working. [# 517191]; and Invalid ContentInfo in responses [# 517057].
    -- " -- Job Scheduling/Notification Unpublishing of expired certificates from the directory doesn't work. [# 512368]
    -- " -- Miscellaneous Disallow specially-formed URI for security.  [# 515951]
    -- " -- Policies BasicConstraintsExt plug-in doesn't recognize the isCA option when it's disabled. [# 516412]
    -- " -- Policies CertificatePoliciesExt plug-in results in errors when some fields are left blank. [# 514915]
    10/12/2000 Software/Hardware Requirements Disk-space requirements.
    10/19/2000 Directory Server Directory Server Gateway bug.
    12/07/2000 Installation CMS Installation Wizard doesn't always detect which ports are in use. [# 522361]
    01/04/2001 Third-Party Products CMS documentation identifies the wrong Check Point product.
    -- " -- Hardware Tokens CMS problem with Chrysalis Luna hardware token. [# 524072 ]
    11/01/2002 Job Scheduling/Notification Registration Manager cannot configure automatic renewal notifications. [# 464982]
    11/01/2002

    Miscellaneous

    Definitions of public and private storage keys. [# 4727931]

    © Copyright © 2002 Sun Microsystems, Inc. Some preexisting portions Copyright © 2000 Netscape Communications Corp. All rights reserved.