⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 jonah instructions.htm

📁 IBM提供的CA认证系统
💻 HTM
📖 第 1 页 / 共 3 页
字号:
<tr><td ALIGN=CENTER COLSPAN="2">The RA is now up and running and waiting forrequests!</td></tr></table><li>So now it is time for enrollment! What is enrollment? Jonah is set up sothe CA does not talk directly to End Entities. All communications to theoutside world are done through the RA. That way the CA can be an ultrasecure machine not sitting on a public network, and the only thing it hasto know how to talk to is the RA. In order for this to work the RA needsto enroll with the CA so they know how to talk to each other, and so theycan exchange public keys so communications can be secure. The next processis enrollment and it is initiated from the RA.</li><table BORDER ><tr><td>On the RA, Select Actions->Enroll with CA</td><td ALIGN=CENTER><img src="images/en01.jpg" height=223 width=324></td></tr><tr><td>Currently getting CA information out of LDAP is not implemented soyou need get the CA information file that was created during the CA bootstrapprocedure to the RA. This file contains no sensitive information so thefile does not need to be transported in a protected way.</td><td ALIGN=CENTER><img src="images/en02.jpg" height=334 width=307></td></tr><tr><td>Select file and specify the path name for the CA information file inthe Filename text area (or use the <b>Browse</b>) button.</td><td ALIGN=CENTER><img src="images/en03.jpg" height=334 width=307></td></tr><tr><td>You must now get the CA's certificate fingerprint from the CA. Thisis an out of band step that makes sure that the certificate you got isreally from the CA you want to enroll with.</td><td ALIGN=CENTER><img src="images/en03a.jpg" height=334 width=307></td></tr><tr><td>To get the CA's fingerprint you must go to the CA GUI and select Actions->DisplayFingerprint.</td><td ALIGN=CENTER><img src="images/en04.jpg" height=244 width=370></td></tr><tr><td>The value of the Fingerprint field is what must be transmitted to theRA. This can be done via cut and paste if the are on the same machine ormanually typed into the RA.</td><td ALIGN=CENTER><img src="images/en05.jpg" height=202 width=433></td></tr><tr><td>Back on the RA the fingerprint needs to be entered. Click on <b>Next</b>.When you click on next the fingerprint that got entered is compared tothe fingerprint of the cert in the CA info file to make sure they match.</td><td ALIGN=CENTER><img src="images/en06.jpg" height=334 width=307></td></tr><tr><td>Select the certificate that you would like to use to enroll with. Thereshould only be one certificate in the selection box with a serial numberof 0. This should be the certificate you use to enroll with. This is theself signed certificate that got created during the RA bootstrap process.Click on <b>finish</b> when done.</td><td ALIGN=CENTER><img src="images/en07.jpg" height=334 width=307></td></tr><tr><td>There should now be an entry under the Certificates tab on the RA withthe a status of <i>EnrollWaiting for CA</i>. This means the request hasbeen sent to the CA and now you are waiting for a response from the CA.</td><td ALIGN=CENTER><img src="images/en08.jpg" height=240 width=234></td></tr><tr><td>On the CA Select the <i>EnrollActive</i> entry. This is the enrollmentrequest from the RA.</td><td ALIGN=CENTER><img src="images/en09.jpg" height=192 width=258></td></tr><tr><td>On the right hand side of the screen you can modify any of the fieldsin the certificate request such as start and end date or name. If you donot modify any of these fields they well get filled in with default valueswhen the certificate is created. Click on <b>Approve</b> when done.</td><td ALIGN=CENTER><img src="images/en10.jpg" height=333 width=332></td></tr><tr><td>The CA now needs to get from the RA the URL that the RA accepts connectionson, and the fingerprint of the certificate that the RA used to enroll with.The URL is in the form of <tt>pkix://hostname:port</tt> where hostnameis the hostname that the RA is running on (you can use localhost if theyare on the same machine) and the port number is the same port number thatwas specified in the transports section of the RA setup procedure (andit can be found in the JonahRA.ini file in the <tt>[Transports]</tt> sectionwith the name of <tt>TCPPort</tt>). The fingerprint from the RA is obtainedthe same way as it was from the CA: The Actions->Display Fingerprint menuitem on the RA. Click on <b>OK</b> when done.</td><td ALIGN=CENTER><img src="images/en11.jpg" height=202 width=433></td></tr><tr><td>The status in the Certificate view on the CA will change and eventuallyit will vanish</td><td ALIGN=CENTER><img src="images/en12.jpg" height=203 width=236></td></tr><tr><td>On the RA the status in the certificate view will change to <i>EnrollCAApproved</i> this means that the RA is now successfully enrolled with theCA</td><td ALIGN=CENTER><img src="images/en13.jpg" height=102 width=244></td></tr><tr><td ALIGN=CENTER COLSPAN="2">The CA and RA are now enrolled!</td></tr></table><li>Now that the CA and RA are up, running and know about each other it istime to bring in the final player, The End Entity (EE). The EE is the personwho requests certificates, uses them, and can revoke them. Our EE codeis a simple GUI that basically deals with requesting and revoking certificates.Using them is an exercise left up to the reader. Start the EE by changingdirectory to <strong>$PKIXDIR</strong> running <tt>JonahEE.bat</tt> on windows or <tt>run_ee</tt>on solaris.</li><table BORDER ><tr><td>The first step in the EE requesting a certificate happens at the RA.The RA pre-registers the user. This creates a new transaction at the RAthat is well become the certificate request. To pre-register a user goto the RA GUI and select Actions->preregister user.</td><td ALIGN=CENTER><img src="images/pr01.jpg" height=204 width=254></td></tr><tr><td>The dialog that comes up is used to put some information into the apreregistration record that well be given to the EE so it has enough informationto generate a cert request. The information that can be supplied on thisscreen is a selection of CAs that this RA talks to, a name for the EE,and a password to protect the pre-registration record with. There is alsoan "authenticate user" check box on this screen. This is used for the RAto indicate if the end entity has proven who they are yet. For examplea person goes to the RA and says they want a certificate and they showthe RA their passport with their name in it. The RA should fill in thename field and check the authenticate user button. In the text area bythe check box the RA can indicate how the user authenticated themselves.<p>The pre-registration record will also contain a transaction identifierand URL so the EE knows how to communicate with the RA. The pre-registrationrecord gets written out to a file. This file needs to be transmitted tothe EE. The password also needs to be transmitted to the EE, but the passwordneeds to be sent in a secure out-of-band way.</td><td ALIGN=CENTER><img src="images/pr02.jpg" height=334 width=351></td></tr><tr><td>The EE is now ready to generate a certificate request. On the EE selectActions->Create Certificate Request.</td><td ALIGN=CENTER><img src="images/cr01.jpg" height=186 width=306></td></tr><tr><td>Enter the pathname for the preregistration record you got from theRA, and enter the password you got with the preregistration record.</td><td ALIGN=CENTER><img src="images/cr02.jpg" height=227 width=408></td></tr><tr><td>You can now specify what you would want in this certificate. (name,start date, end date etc). Except for a key, whatever you do not supplywell be specified by the RA/CA. But you do need to supply a public keyso click on the <b>Key</b> tab on the right hand side of the screen. SelectEE generated key, and the desired key type and length. EE generated keysare the only types of keys supported at this time.</td><td ALIGN=CENTER><img src="images/cr03.jpg" height=325 width=315></td></tr><tr><td>After you specified everything you want to hit the<b>submit</b>button at the bottom of the screen. Check the export to smart card optionand enter the User PIN you used when initializing the EE's virtual smartcard (when you ran initsc with no arguments). When done click on <b>Export</b>.This is going to generate a keypair, store it on the smart card and sendthe request to the RA. So it might take a little bit of time.</td><td ALIGN=CENTER><img src="images/cr05.jpg" height=281 width=286></td></tr><tr><td>The Cert Request has left the EE and is now at the RA.</td><td ALIGN=CENTER><img src="images/cr06.jpg" height=177 width=251></td></tr><tr><td>The certificate request is now active on the RA, Go to the RA GUI andyou should see a <b>CertActive</b> entry in the left pane.</td><td ALIGN=CENTER><img src="images/cr07.jpg" height=220 width=237></td></tr><tr><td>The RA now has the ability to change any of the fields in the certrequest.  Or it can <b>Approve</b> it in which case it'll be sent tothe CA, or it can <b>Reject</b> reject it in which case it'll send arejection message back to the EE. For this exercise we are going toapprove it. Before we approve the request make sure the authenticateuser button is checked.  It is the RA's responsibility to make surethat the requester of the certificate is who they say they are, so atsome point in time the RA does have to authenticate the user. Click on<b>Approve</b>.</td><td ALIGN=CENTER><img src="images/cr08.jpg" height=332 width=271></td></tr><tr><td>Go to the CA GUI, on the left hand side you'll see a request in the <b>CertActive</b> state. Select this request, and the right hand side of the screen will update with the properties of this request. Like the RA, the CA has two options here, it can approve the request, in which case it'll create a certificate to be sent back to the EE, or it can deny the request in which case an error message well be sent back to the EE. The CA can also change any of the fields in the certificate request. Click on <b>Approve</b> to create the certificate.</td><td ALIGN=CENTER><img src="images/cr09.jpg" height=194 width=256></td></tr><tr><td>The request now makes it way back to the end entity. Firstthe CA ...</td><td ALIGN=CENTER><img src="images/cr10.jpg" height=202 width=259></td></tr><tr><td>Then the RA&nbsp;</td><td ALIGN=CENTER><img src="images/cr11.jpg" height=199 width=264></td></tr><tr><td>And finally to the EE</td><td ALIGN=CENTER><img src="images/cr12.jpg" height=181 width=260></td></tr><tr><td>We are almost done! Now that the EE has the final cert back it canreview it to make sure it is what they wanted <i>(OK, there is a bug inthe EE GUI that prevents it from displaying the contents of the certificateon the right hand side. So you really can't look at the certificate, butlets pretend.)</i>. If the certificate is what you want you should pressthe <b>Confirm</b> button. This sends a message to RA telling it that thecert is OK, and that it can go ahead and publish it to LDAP.</td><td ALIGN=CENTER><img src="images/cr13.jpg" height=100 width=317></td></tr><tr><td>If you look on the RA the request vanished from the certificates sectionon the right hand side, if you click on the postings tab you well see thequeue for things to be posted to LDAP, once they get posted to LDAP thewill disappear from this tab.</td><td ALIGN=CENTER><img src="images/cr14.jpg" height=194 width=232></td></tr><tr><td COLSPAN="2">If the certificate is not what you wanted, or after youconfirm it you decide you do not want the certificate anymore, you canhit the <b>Revoke</b> button. This will create a revocation request. Theprocess for submitting a revocation request is similar to that of the certrequest.</td></tr></table></ol></ol></body></html>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -