-
Notifications
You must be signed in to change notification settings - Fork 139
PKI 10.4 Installing Standalone KRA
This page describes the process to install a standalone KRA. In normal KRA installation the CSRs are submitted automatically to the issuing CA and the certificates are issued and imported automatically as well. In this scenario, however, the KRA uses a manual 2-step process to generate the CSRs and to import the certificates. This mechanism provides the flexibility to use non-PKI CA to issue the certificates.
Unlike the normal KRA installation, it will not join the CA’s security domain and no KRA connector will be configured in the CA for key archival.
The installation process consists multiple steps:
-
Generating certificate requests
-
Issuing the certificates
-
Completing installation with the certificates
Prepare a deployment configuration file for step 1 (e.g. kra-standalone-step1.cfg
):
[KRA] [email protected] pki_admin_name=kraadmin pki_admin_nickname=kraadmin pki_admin_password=Secret.123 pki_admin_uid=kraadmin pki_client_database_password=Secret.123 pki_client_database_purge=False pki_client_pkcs12_password=Secret.123 pki_ds_base_dn=dc=kra,dc=example,dc=com pki_ds_database=kra pki_ds_password=Secret.123 pki_security_domain_name=EXAMPLE pki_token_password=Secret.123 pki_standalone=True pki_external_step_two=False pki_storage_nickname=kra_storage pki_transport_nickname=kra_transport pki_subsystem_nickname=subsystem pki_sslserver_nickname=sslserver pki_audit_signing_nickname=kra_audit_signing pki_external_storage_csr_path=kra_storage.csr pki_external_transport_csr_path=kra_transport.csr pki_external_subsystem_csr_path=subsystem.csr pki_external_sslserver_csr_path=sslserver.csr pki_external_audit_signing_csr_path=kra_audit_signing.csr pki_external_admin_csr_path=kra_admin.csr
Optionally, specify the HSM parameters:
pki_hsm_enable=True pki_hsm_libfile=/opt/nfast/toolkits/pkcs11/libcknfast.so pki_hsm_modulename=nfast
Then execute the following command:
$ pkispawn -f kra-standalone-step1.cfg -s KRA
It will create an NSS database in /var/lib/pki/pki-tomcat/alias
and generate CSRs in the specified paths.
Use the CSRs to issue KRA certificates:
Place the issued certificates in the location indicated in the next section.
Prepare a deployment configuration for step 2 (e.g. kra-standalone-step2.cfg
) by copying it from step 1 (i.e. kra-standalone-step1.cfg
) and make the following changes.
Specify step 2 with the following parameter:
pki_external_step_two=True
Specify the certificate files with the following parameters:
pki_external_storage_cert_path=kra_storage.crt pki_external_transport_cert_path=kra_transport.crt pki_external_subsystem_cert_path=subsystem.crt pki_external_sslserver_cert_path=sslserver.crt pki_external_audit_signing_cert_path=kra_audit_signing.crt pki_external_admin_cert_path=kra_admin.crt
Each certificate file can contain either a single PEM certificate or a PKCS #7 certificate chain.
If all of the above certificate files contain single certificates, the CA signing certificate and/or the certificate chain can be specified with the following parameters:
pki_external_ca_cert_chain_nickname=cert_chain pki_external_ca_cert_path=ca_signing.crt pki_external_ca_cert_chain_path=cert_chain.p7b
The CA signing certificate and the certificate chain file can contain either a single certificate or a PKCS #7 certificate chain as well.
Finally, execute the following command:
$ pkispawn -f kra-standalone-step2.cfg -s KRA
$ pki -d ~/.dogtag/pki-tomcat/kra/alias -c Secret.123 -n kraadmin kra-user-find ----------------- 2 entries matched ----------------- User ID: kraadmin Full name: kraadmin User ID: pkidbuser Full name: pkidbuser ---------------------------- Number of entries returned 2 ----------------------------
Tip
|
To find a page in the Wiki, enter the keywords in search field, press Enter, then click Wikis. |