Auto-enrollment Server 7.0 Installation and Configuration

Entrust Managed Services PKI™
Auto-enrollment Server 7.0
Installation and Configuration Guide
Document issue: 1.0
Date of Issue: July 2009
Copyright © 2009 Entrust. All rights reserved.
Obtaining technical support
Entrust is a trademark or a registered trademark of Entrust,
Inc. in certain countries. All Entrust product names and
logos are trademarks or registered trademarks of Entrust,
Inc. in certain countries. All other company and product
names and logos are trademarks or registered trademarks
of their respective owners in certain countries.
For support assistance by telephone call one of the
numbers below:
• 1-877-754-7878 in North America
• 1-613-270-3700 outside North America
You can also email Customer Support at:
support@entrust.com
This information is subject to change as Entrust reserves
the right to, without notice, make changes to its products
as progress in engineering or manufacturing methods or
circumstances may warrant.
Export and/or import of cryptographic products may be
restricted by various regulations in various countries.
Export and/or import permits may be required.
2
Auto-enrollment Server 7.0 Installation and Configuration Guide
TOC
About Auto-enrollment Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
Overview
................................................... 8
Auto-enrollment Server system components
........................ 9
Tier 1
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Tier 2
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Tier 3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
How the auto-enrollment process works
Auto-enrollment request
. . . . . . . . . . . . . . . . . . . . . . . . . . 13
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Choice of certificate type and role
. . . . . . . . . . . . . . . . . . . . . . . . . . 13
Auto-enrollment decision procedure
. . . . . . . . . . . . . . . . . . . . . . . . . 14
Enrollment and recovery queues for administrator approval
How the distinguished name (DN) is created
How the subjectAltName is created
. . . . . . . 14
. . . . . . . . . . . . . . . . . . . . . . . 16
. . . . . . . . . . . . . . . . . . . . . . . . . 17
How the subjectAltName is created for domain controller certificates
17
Preparing for installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Planning your installation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
What you should have from Entrust for the pre-installation
Pre-installation tasks
. . . . . . . 21
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Step 1: Installing the Web Server
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Step 2: Obtaining a Web server certificate
. . . . . . . . . . . . . . . . . . . . . . . . . 24
Step 3: Assigning the certificate to your Web server
Step 4: Enabling SSL on your Web server
. . . . . . . . . . . . . . . . . 42
. . . . . . . . . . . . . . . . . . . . . . . . . . 51
Step 5: Configuring integrated Windows authentication
Step 6: Testing the SSL-enabled Web server
. . . . . . . . . . . . . . 56
. . . . . . . . . . . . . . . . . . . . . . . . 60
Step 7: Obtaining a certificate for Auto-enrollment Server
. . . . . . . . . . . . . 61
Installing Auto-enrollment Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
What you should have from Entrust for the installation of Auto-enrollment
Server
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Installing Auto-enrollment Server
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Checking the Auto-enrollment Server installation
Verify adminservice.log file
. . . . . . . . . . . . . . . . . . . . 86
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Verify the Web server is passing requests to Auto-enrollment Server
Verify installation log file
Verify configuration log file
86
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Customizing the Auto-enrollment Server . . . . . . . . . . . . . . . . . . . . . . . . . . . .89
What you should have from Entrust for Auto-enrollment Server
customizations
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Customizing the certificate type and user role
Configuring a default certificate type
Configuring a default User Role
. . . . . . . . . . . . . . . . . . . . . . 91
. . . . . . . . . . . . . . . . . . . . . . . . 91
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Configuring the client information setting
Customizing certificate lifetimes
. . . . . . . . . . . . . . . . . . . . 93
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Customizing a user’s Distinguished Name (DN)
. . . . . . . . . . . . . . . . . . . . . 97
Customizing a search base for enrolling clients
. . . . . . . . . . . . . . . . . . . . . . 98
Configuring the DNS name
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Configuring queuing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .101
Enabling queuing in Auto-enrollment Server
. . . . . . . . . . . . . . . . . . . . . . 102
Configuring the ae-defaults.xml file to queue requests
Configuring the queuing monitor
. . . . . . . . . . 102
. . . . . . . . . . . . . . . . . . . . . . . . . . 103
Approving or rejecting requests in Administration Services
. . . . . . . . . . . . 105
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .109
Logging configuration
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Setting the log level
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Setting the log file location
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Setting the maximum log file size
. . . . . . . . . . . . . . . . . . . . . . . . . . 112
Setting the number of backup log files allowed
Setting the maximum message length
4
Auto-enrollment Server 7.0 Installation and Configuration Guide
. . . . . . . . . . . . . . . 113
. . . . . . . . . . . . . . . . . . . . . . 114
Document issue: 1.0
Time synchronization
Error messages
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Glossary of terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Writing your own DN Builder implementation code . . . . . . . . . . . . . . . . . . 131
DN Builder examples
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Customizing the DN builder code
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
DistinguishedNameBuilderDefaultImp
. . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Customizing the default DN Builder implementation
Constructor Summary
. . . . . . . . . . . 135
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Method Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Constructor Detail
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Method Detail
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
ActiveDirectoryUserInfo
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Method Summary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Method Detail
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
5
6
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
1
About Auto-enrollment Server
The Entrust Authority™ Auto-enrollment Server creates certificates and sends these
transparently to an Entrust Entelligence™ Security Provider for Windows client.
The following topics provide an introduction to Auto-enrollment Server:
•
“Overview” on page 8
•
“Auto-enrollment Server system components” on page 9
•
“How the auto-enrollment process works” on page 13
7
Overview
The Auto-enrollment Server simplifies certificate deployment by providing automatic
enrollment of keys and certificates to users and computers. Enrollment is also
transparent to the administrator (the level of transparency to the end-user depends
on the user key store selected for key protection).
The Auto-enrollment Server communicates with the Security Provider for Windows
client to automatically deliver a certificate to Windows-based users or computers.
Auto-enrollment Server can provide a certificate to the following Windows-based
machines:
•
Laptops and desktops
•
Microsoft Windows IIS Web browsers and servers
•
Domain Controllers
•
Authentication clients and servers (RRAS, IAS, VPN, Radius Servers)
Note: The Security Provider for Windows client must be online at the time of
the initial auto-enrollment request, in order for the request to be processed by
Auto-enrollment Server.
When the enrollment request is sent from the Security Provider for Windows client to
Auto-enrollment Server, the enrollment may be processed automatically or the
enrollment may be queued. Queuing is an optional feature, which takes an
enrollment request and leaves it at the Auto-enrollment Server for approval by an
administrator. In the case of an automatically processed request, Auto-enrollment
Server contacts the Certification Authority (CA) for approval. Once the
auto-enrollment request has been automatically approved or approved by the
administrator in the case of queuing, the authorization code and reference number
are passed to the Security Provider for Windows client. The Security Provider for
Windows client uses the authorization code and reference number to complete the
enrollment process.
8
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Auto-enrollment Server system components
The following figure provides an illustration of the Auto-enrollment Server system
components in a Three-Tier client/server environment:
Figure 1: Auto-enrollment Server system components
About Auto-enrollment Server
Report any errors or omissions
9
Tier 1
Entrust Entelligence Security Provider for Windows (Security Provider) is known as
the tier 1 client component in this three-tier client/server environment.
Note: You host the Security Provider client.
Entrust Entelligence™ Security Provider for Windows
Entrust Entelligence Security Provider for Windows (Security Provider) is the client
that transparently communicates with Auto-enrollment Server to enroll certificates.
Auto-enrollment Server transparently issues certificates to a user or computer
through Security Provider.
Auto-enrollment is enabled per-CA by configuring the following registry values:
•
AutoEnrollUserURL
•
AutoEnrollMachineURL
You can configure the registry values in the Windows registry of the machine in which
Security Provider is installed or through Security Provider’s Custom Installation wizard
(Specify Entrust PKI Information page). For more information on adding these values,
see the Entrust Entelligence Security Provider for Windows Administration Guide.
A CA can have user auto-enrollment and machine auto-enrollment enabled for it.
If the AutoEnrollUserURL value is present, user auto-enrollment is enabled for that
CA. If the AutoEnrollMachineURL value is present, machine auto-enrollment is
enabled for that CA. Both values support a list of Auto-enrollment Server URLs in case
connections to multiple Auto-enrollment Servers should be attempted. If a
connection to the first Auto-enrollment Server does not work, the second server URL
is tried, and so on. Once a connection is established with one Auto-enrollment Server,
connections to other servers are not attempted.
Tier 2
The Microsoft Internet Information Services (IIS) Web Server and Tomcat Application
Server are known as tier 2 in the three-tier client/server environment. The Web Server
and Application Server provide the middle-tier processing between Security Provider
and the CA.
Note: You host the IIS Web Server and the Tomcat Application Server.
10
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Microsoft Internet Information Services (IIS) Web Server
Security Provider for Windows communicates with the Microsoft IIS Web Server
through a firewall. SSL encryption must be used on the Web Server to secure the
connection between Security Provider and Auto-enrollment Server. Security Provider
communicates directly with an SSL-enabled Microsoft IIS Web Server over HTTPS.
The Microsoft IIS Web Server is configured to authenticate Security Provider through
Windows Integrated Authentication using the NTLM or Kerberos authentication
methods.
Tomcat Application Server
The Tomcat Application Server is connected directly to the Microsoft IIS Web Server.
The Microsoft IIS Web Server communicates through a Tomcat isapi filter to a JK2
Connector in the Tomcat Application Server. The JK2 Connector passes information
to the Auto-enrollment Server located in the Tomcat Application Server.
Tier 3
Entrust Managed Services PKI certification authority (CA) is known as the tier 3 server
component in a three-tier client/server environment.
Note: Entrust Managed Services PKI hosts the CA.
Entrust Managed Services PKI certificate authority
Entrust Managed Services PKI runs the certification authority (CA) for the
Auto-enrollment Server system. The main functions the CA is to:
•
create certificates for all public keys
•
create encryption key pairs
•
provide a managed, secure database of information that allows the recovery
of encryption key pairs
•
enforce the security policies defined by your organization
•
publish Certificate Revocation Lists (CRLs)
•
publish Policy Certificates
Auto-enrollment Server must be able to communicate with the XML Administration
Protocol (XAP) Server running as part of the CA. Communication between these
components is XAP over HTTPS.
About Auto-enrollment Server
Report any errors or omissions
11
Directory
The majority of information requests involve retrieving certificates. To make this
information publicly available, the CA uses a public repository known as a directory.
The directory is an LDAP (Lightweight Directory Access Protocol) compliant directory
service.
Information that is made public through the directory includes:
•
user certificates
•
lists of revoked certificates
•
client policy information
Public encryption certificates for each user, certificate revocation lists (CRLs), and
other information are written from the CA to the directory.
Auto-enrollment Server Servlets need access to the directory in order to log in to their
profiles.
Database
The database is under the control of Entrust Managed Services PKI and acts as a
secure storage area for all information related to the CA. The database stores:
•
the CA signing key pair (this key pair may be created and stored on a
separate hardware device rather than the database)
•
user or computer status information
•
the encryption key pair history (including all decryption private keys and
encryption public key certificates) for each user and computer
•
the verification public key history (including all verification public key
certificates) for each user and computer
•
the validity periods for signing key pairs, encryption key pairs, and system
cross-certificates
•
Security Officer and administrator information
•
CA policy information
•
revocation information
Note: All information stored in the database is secured to protect against
tampering.
12
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
How the auto-enrollment process works
The following sections provide a high-level view of the auto-enrollment process:
•
“Auto-enrollment request” on page 13
•
“Choice of certificate type and role” on page 13
•
“Auto-enrollment decision procedure” on page 14
•
“Enrollment and recovery queues for administrator approval” on page 14
Auto-enrollment request
Security Provider sends an auto-enrollment request over SSL to the Microsoft IIS Web
Server. Windows Authentication is performed, using the NTLM or Kerberos
authentication protocol, and this determines the Windows domain and name of the
remote client that sent the request.
The Auto-enrollment Server builds a distinguished name (DN) from the Windows
domain and user name found in the auto-enrollment request. There may be messages
sent from the Auto-enrollment Server to the directory to determine the first and last
names.
An authentication servlet in the Tomcat Application Server receives the request
through an ISAPI connector. The client is authenticated primarily through
membership in a Windows domain name. The user’s Windows domain and account
name must be mapped by the server to an X.500 distinguished name (DN). The
default mapping creates a common name from the user’s Windows domain login
name. This is received by the authentication component.
The administrator can choose to customize the distinguished name (DN) builder
implementation, instead of using the default. The DistinguishedNameBuilder
interface can be used to define your own mapping procedure. Refer to the section
“Customizing a user’s Distinguished Name (DN)” on page 97.
Choice of certificate type and role
The choice of certificate type and user role is made by Auto-enrollment Server and is
configurable in the ae-defaults.xml file. Refer to the section “Customizing the
certificate type and user role” on page 91 for further information.
When Auto-enrollment Server decides the Certificate Type and Role that will be used
for the enrollment, it communicates this to the CA so the appropriate identity is
created.
About Auto-enrollment Server
Report any errors or omissions
13
Auto-enrollment decision procedure
When the auto-enrollment/recovery request is sent from Security Provider to
Auto-enrollment Server, Auto-enrollment Server sends one of the following three
types of responses to Security Provider:
•
Approval response
A response that includes an authorization code and reference number
Security Provider can use to communicate with the CA, and enroll/recover
the user or computer. The response also indicates the validity period of these
activation codes and whether an enrollment or recovery should be
performed.
•
Queued response
A response which indicates that the request has been queued for
administrative approval.
•
Rejection response
A response that includes an error code and reason indicating why the
auto-enrollment/recovery cannot occur.
Once Security Provider has the approval response, communication with
Auto-enrollment Server is complete. The enrollment or recovery is then performed
through direct communication with the CA.
Enrollment and recovery queues for administrator approval
When an auto-enrollment request is sent from Security Provider to Auto-enrollment
Server, Auto-enrollment Server can be configured to automatically process the
request immediately or queue the enrollment request. Queuing is an optional feature
and occurs when an enrollment request waits at Auto-enrollment Server for approval
by an administrator. Refer to the chapter “Configuring queuing” on page 101 for
further information on configuring queuing.
When an auto-recovery request is sent from Security Provider to Auto-enrollment
Server, Auto-enrollment Server can be configured to automatically process the
request immediately, queue the recovery request, or reject the request immediately.
For further information on what triggers an auto-recovery request, refer to the
Entrust Entelligence Security Provider for Windows Administration Guide.
When queuing is available, all auto-recovery requests are placed in the queue and the
administrator will decide if an auto-recovery should be granted or denied. When
queuing is not available for an administrator, the following automatic auto-recoveries
will be granted or denied:
Granted
14
•
when the signing certificate is expired
•
when the user is in the Key Recovery state at the CA
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Denied
•
when the signing certificate is revoked
•
when updates are not allowed at the CA for this user
When an auto-recovery is denied, Auto-enrollment Server returns an error to Security
Provider. When the error message displays to the end user, explaining that the
auto-recovery attempt failed, the user must inform their administrator that a recovery
is required. To enable key recovery for the user, the administrator has to set the user
for Key Recovery at the CA. This switches the user from the Active state into the Key
Recovery state at the CA, and an auto-recovery is automatically granted by
Auto-enrollment Server.
About Auto-enrollment Server
Report any errors or omissions
15
How the distinguished name (DN) is created
Auto-enrollment Server may create a distinguished name (DN) for the user or
computer if a DN does not already exist in the directory. The default behavior of the
DN builder implementation in the Auto-enrollment Server is to take the user or
computer name and the domain name to create a DN for this user or computer. If the
DN already exists in the directory, most likely when Active Directory is used, it will not
be created. If the DN does not already exist in the directory, the DN is added.
When the DN is created for a user or computer, it is created differently based upon
the directory and whether it is a DN for a user or computer.
LDAP Directory
The DN of the user or computer is created by using the user or computer name, from
the Windows domain name and the DN of the CA.
For example, assume the following:
•
computer name is yottbsmith
•
the Windows user is bsmith
•
the domain name is SOMEDOMAIN
•
the complete domain name is SOMEDOMAIN.abc.com
•
the CA DN is ou=SomeUnit, o=abc, c=ca
The user being auto-enrolled will have the following default Subject name:
cn=bsmith SOMEDOMAIN, ou=SomeUnit, o=abc, c=ca
The computer being auto-enrolled will have the following default Subject name:
cn=bsmith$ SOMEDOMAIN, ou=SomeUnit, o=abc, c=ca
When your organization requires you to create DNs for your users or computers in a
different manner than the above example, you may choose to customize the default
DN builder implementation. Refer to the section “Customizing a user’s Distinguished
Name (DN)” on page 97 for further details.
Active Directory
The DN for the user or computer in Active Directory is used for the DN in Entrust
Managed Services PKI. There are no exceptions and this cannot be customized.
Note: This is advanced configuration. Contact your Entrust representative for
more information.
For example, assume the following:
16
•
computer name is yottbsmith
•
the Windows user is bsmith
•
the domain name is SOMEDOMAIN
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
•
the complete domain name is SOMEDOMAIN.abc.com
•
the machine with Active Directory running on it (the domain controller) has
the machine name SOMESERVER
•
the CA DN is cn=SOMESERVER, cn=AIA, cn=Public Key Services,
cn=Services, cn=Configuration, dc=SOMEDOMAIN, dc=abc,
dc=com
The user being enrolled will have the following default Subject name:
cn=bsmith, cn=Users, dc=SOMEDOMAIN, dc=abc, dc=com
The computer being auto-enrolled will have the following Subject name:
cn=yottbsmith, cn=Computers, dc=SOMEDOMAIN, dc=abc, dc=com
How the subjectAltName is created
Auto-enrollment Server may create a subjectAltName for the user or computer.
The default behavior of the DN builder implementation in Auto-enrollment Server, is
to add a subjectAltName for computers and not to add one for users.
Auto-enrollment Server takes the computer name and domain and builds the
dNSName, for example, dNSName=computer_name.complete_domain_name.
This value is provided when the user or computer is being added to the CA. Entrust
Managed Services PKI then adds the dNSName to the SubjectAltName extension of
the certificate.
For example, assume the following:
•
computer name is yottbsmith
•
the domain name is SOMEDOMAIN
•
the complete domain name is SOMEDOMAIN.abc.com
The dNSName of the above example is:
dNSName=yottbsmith.SOMEDOMAIN.abc.com
Auto-enrollment Server does a dNSName lookup to get the domain. If the dNSName
lookup fails, as a backup you can customize the ae-defaults.xml file to build a
dNSName. Refer to the section “Configuring the DNS name” on page 99 for further
instructions.
How the subjectAltName is created for domain controller
certificates
Certificates for domain controllers always have extra information added to the
subjectAltName. This complies with the “Requirements for Domain Controller
Certificates from a Third-Party CA” (article ID 291010) as documented by Microsoft.
In addition to the dNSName, the directory must include the globally unique identifier
(GUID) of the domain controller object. The directory stores the GUID in the
About Auto-enrollment Server
Report any errors or omissions
17
subjectAltName as an Other Name, and it is DER encoded. An example of a
subjectAltName with the globally unique identifier (GUID) of the domain
controller object in the directory and the Domain Name System (dNSName) is:
Other Name: 1.3.6.1.4.1.311.25.1 = ac 4b 29 06 aa d6 5d 4f a9 9c
4c bc b0 6a 65 d9
DNS Name=ComputerNameOfDomainController.SOMEDOMAIN.abc.com
When Security Provider creates the auto-enrollment request message for
Auto-enrollment Server, it checks if the computer is a domain controller. If yes, it
queries the Active Directory and asks for the GUID of the domain controller. Security
Provider for Windows will then include the following two pieces of information in the
request message to the Auto-enrollment Server:
•
confirmation that the computer is a domain controller
•
the GUID
Passing this information in the request message allows Auto-enrollment Server to set
extra information in the subjectAltName when necessary.
18
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
2
Preparing for installation
This chapter describes how to prepare for the Auto-enrollment Server installation.
Read this chapter if you are the system administrator installing and configuring
machines hosting the Auto-enrollment Server components.
This chapter contains the following sections:
•
“Planning your installation” on page 20
•
“Step 1: Installing the Web Server” on page 22
•
“Step 2: Obtaining a Web server certificate” on page 24
•
“Step 3: Assigning the certificate to your Web server” on page 42
•
“Step 4: Enabling SSL on your Web server” on page 51
•
“Step 5: Configuring integrated Windows authentication” on page 56
•
“Step 6: Testing the SSL-enabled Web server” on page 60
•
“Step 7: Obtaining a certificate for Auto-enrollment Server” on page 61
19
Planning your installation
The following flowchart illustrates the pre-installation steps required for Entrust
Managed Services PKI customers installing Auto-enrollment Server.
Figure 2: Pre-installation flowchart
Attention: Auto-enrollment Server is an add-on that works together with
Entrust Entelligence Security Provider (Security Provider). As such, you must
already have Security Provider installed at this time. Security Provider and related
documentation is available for download from Entrust TrustedCare at
https://secure.entrust.com/trustedcare/.
20
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
What you should have from Entrust for the pre-installation
Ensure you have all the items listed in the table below. If you do not, contact Entrust
Managed Services PKI.
Table 1: Pre-install check list
Item
Have it?
Your organization’s URL to Administration Services, a Web-based
application that allows you to create and manage certificates and
accounts.
Credentials to access Entrust TrustedCare
(https://secure.entrust.com/trustedcare/), which allows you to
download purchased software and related documentation
Entrust Managed Services PKI Welcome letter. Specifically the name
of the Certificate type to select when creating the Web Server
certificate account.
Pre-installation tasks
You must complete the following tasks, in order, prior to installing Auto-enrollment
Server.
Note: This guide assumes you have already obtained an administrator
certificate. If you are an Entrust Managed Services PKI customer, but have not
yet created an administrator certificate, see the Administrator Guide under the
Resources tab of www.entrust.com/managed_services.
•
“Step 1: Installing the Web Server” on page 22
•
“Step 2: Obtaining a Web server certificate” on page 24
•
“Step 3: Assigning the certificate to your Web server” on page 42
•
“Step 4: Enabling SSL on your Web server” on page 51
•
“Step 5: Configuring integrated Windows authentication” on page 56
•
“Step 6: Testing the SSL-enabled Web server” on page 60
•
“Step 7: Obtaining a certificate for Auto-enrollment Server” on page 61
Preparing for installation
Report any errors or omissions
21
Step 1: Installing the Web Server
If you have not done so already, install the Microsoft IIS Web Server.
Note: Ensure you understand all specific security requirements for your product.
The following procedure describes the Microsoft IIS Web Server installation on a
Windows 2003 server.
To install Microsoft IIS Web Server (Windows 2003 Server)
1
Click Start > Control Panel > Add or Remove Programs.
The Add or Remove Programs dialog box appears.
2
From the left menu pane, select Add/Remove Windows Components.
After a few moments, the Windows Components Wizard dialog box appears.
22
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
3
Select Application Server and click Next.
Note: This preforms a default installation. For production purposes, you should
consult your organization’s security policy to determine which components to
install.
4
Once complete, click Finish.
Preparing for installation
Report any errors or omissions
23
Step 2: Obtaining a Web server certificate
To enable SSL between the Security Provider for Windows client and the Microsoft
IIS Web server, a certificate for the Web server is required.
If you are deploying Auto-enrollment Server in a multi-domain environment, ensure
that each Microsoft IIS Web server is issued a certificate.
Complete the following procedures, in order:
•
“To log in to Administration Services” on page 24
•
“To create a Web server certificate account” on page 26
•
“To enroll for the Web server certificate using Security Provider” on page 33
To log in to Administration Services
1
Enter the Administration Services URL provided by Entrust Managed Services PKI
into a browser.
The following page appears.
2
24
Depending on where you stored your administrator certificate, do one of the
following:
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
if you stored your certificate...
Do this
in the Entrust desktop security store on
your computer
1 Click Browse to navigate to the location where
you stored your administrator digital ID (.epf
file) and click Open.
The file name and path appear in the Entrust
Desktop Security Store File Name field. Select
Remember Entrust Desktop Security Store File
Name to retain the path.
2 Enter the password you created for your
certificate and click Log in.
within the Windows framework or on a
smart card or token.
1 Click the Log in with my Third-Party Security
Store link.
The Administrator Login - Third-Party Security
Store page appears.
Note: If logging in with a smart card or token,
ensure it is connected to your computer.
2 Click Display certificate list.
The Select Certificate dialog box appears listing
one or more digital certificates.
3 Select your certificate from the list and click OK.
Preparing for installation
Report any errors or omissions
25
Upon successful login, the following page appears.
You successfully logged in to Administration Services.
To create a Web server certificate account
1
26
If you are not already logged in to Administration Services, do so now. See “To
log in to Administration Services” on page 24 for more information.
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
The main page appears.
2
Click Create Account under Account Tasks in the main pane or under Tasks in the
left-hand menu.
The initial Create Account page appears.
Preparing for installation
Report any errors or omissions
27
3
From the User Type drop-down list, select Web server.
4
From the Certificate Type drop-down list, select your company’s specific
certificate type. Consult your Entrust Managed Services PKI Welcome letter for
more information.
5
Click Submit.
A second Create Account page appears where you provide the Web server name
and other information.
28
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
6
From the User Information section:
a
In the Name field, enter the fully qualified domain name (FQDN) of the
server (for example, test.dev.ad.entrust.com).
b
Optionally, enter a description of the Web server certificate account in the
Description field.
7
Leave the Notification Email field empty.
8
From the Group Membership section, select the member option. If no groups are
configured, only the default group appears.
9
From the Role section, select End User from the drop-down list.
10 From the Location section, click Select the searchbase and select your company
name from the drop-down list (an entry for your organization was created in the
directory when you signed up for Entrust Managed Services PKI). This specifies
where to add the Web server account in the Administration Services LDAP
directory.
11 Click Submit.
The Create Account - Complete page appears.
Preparing for installation
Report any errors or omissions
29
12 Securely record the reference number and authorization code. You need these
activation codes later during enrollment.
13 Click the name of your Web server certificate in the Name column on the Create
Account - Complete page.
The Account Details - <Web server name> page appears, where <Web server
name> is the FQDN of your Web server.
30
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
14 Scroll down and click Edit Account.
15 On the Edit Account - Basic Information page, scroll down to the bottom of the
page and click the Edit Advanced Information link.
The Edit Account - Advanced Information page appears.
Preparing for installation
Report any errors or omissions
31
16 In the Subject Alternative Naming Information section, enter the following in the
DNS field (including the quotation marks):
“dnsName=<FQDN>”
where
<FQDN> is the fully qualified domain name of your Web server.
Note: If your machine is known by multiple names on the network, you can put
multiple dnsName entries into the certificate, separated by a space. This allows a
single certificate to be used for all instances.
17 Proceed to the below procedure: “To enroll for the Web server certificate using
Security Provider” on page 33.
32
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
To enroll for the Web server certificate using Security Provider
1
Open the Microsoft Management Console:
a
Click Start > Run.
b
Enter mmc and click OK.
The console appears.
2
From the console, click File > Add/Remove Snap-in.
The Add/Remove Snap-in dialog box appears.
Preparing for installation
Report any errors or omissions
33
3
From the Standalone tab, click Add.
The Add Standalone Snap-in dialog box appears.
34
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
4
Select Entrust Computer Digital ID from the snap-in list, and click Add.
The Select Computer dialog box appears.
Preparing for installation
Report any errors or omissions
35
5
Select Local computer and click Finish.
6
Click Close to close the Add Standalone Snap-in dialog box.
7
Click OK on the Add/Remove Snap-in dialog box.
The console reappears with the Entrust Computer Digital ID snap-in listed.
36
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
8
From the left pane of the console, right-click Entrust Computer Digital ID and
select Enroll Computer for Entrust Digital ID.
The Welcome to the Enroll Computer for Entrust Digital ID Wizard appears.
9
Click Next.
The Specify the activation codes screen appears.
Preparing for installation
Report any errors or omissions
37
10 Enter the reference number and authorization code you obtained in Step 12 on
page 30 into the respective fields and click Next.
Security Provider contacts the Entrust Managed Services PKI Certification
Authority (CA) and, when successful, displays the Confirm Entrust Digital ID
Enrollment screen.
38
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
11 Click Next.
A security warning may appear advising you that you are about to install a
certificate issued from the Entrust Managed Services PKI Certification Authority
(CA).
Preparing for installation
Report any errors or omissions
39
12 Click Yes to install the certificate.
The Completing the Enroll Computer for Entrust Digital ID Wizard screen
appears.
40
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
13 Click Finish.
You successfully enrolled your Web server certificate.
Preparing for installation
Report any errors or omissions
41
Step 3: Assigning the certificate to your Web
server
Complete the following procedure to assign the SSL certificate to your Web server.
To assign the certificate to your Web server
1
Click Start > All Programs > Administrative Tools > Internet Information Services
(IIS) Manager.
The Internet Information Services (IIS) Manager appears.
2
In the left pane, expand <x> (local computer) and then expand the Web Sites
folder, where <x> is the name of your computer. (In the screenshot above, the
computer is named TEST.)
3
Right-click the Web site your want to configure for SSL (for example, Default
Web Site) and select Properties.
The <x> Properties dialog box appears, where <x> is the name of the Web site
you selected to configure.
42
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
4
Click the Directory Security tab.
The Directory Security tab appears.
Preparing for installation
Report any errors or omissions
43
5
In the Secure communications section, click Server Certificate.
The Welcome to the Web Server Certificate Wizard wizard appears.
44
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
6
Click Next.
The Server Certificate screen appears.
Preparing for installation
Report any errors or omissions
45
7
Select Assign an existing certificate and click Next.
The Available Certificates screen appears.
46
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
8
Select the certificate you created for your Web server and click Next.
The SSL Port screen appears.
Preparing for installation
Report any errors or omissions
47
9
Accept the default SSL port 443 and click Next.
The Certificate Summary screen appears.
48
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
10 Verify everything is correct and click Next.
The Completing the Web Server Certificate Wizard screen appears.
Preparing for installation
Report any errors or omissions
49
11 Click Finish.
You successfully assigned your SSL Web server certificate in Microsoft IIS.
50
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Step 4: Enabling SSL on your Web server
You must enable SSL encryption on your Microsoft IIS Web server to secure the
connection between the browser on the machine Security Provider is installed and
Auto-enrollment Server. When configuring your Web server, it is advised that you do
the following:
•
Enforce 128-bit encryption for browsers accessing your Microsoft IIS Web
Server.
•
Enable server SSL authentication so that only the client checks the server’s
Web certificate but there is no mutual authentication
The following procedure describes how to enable SSL on Microsoft IIS Web server
6.0. For all other versions, follow the instructions provided in your Microsoft IIS Web
server documentation.
Note: Restart your Microsoft IIS Web server after enabling it for SSL.
To enable SSL on Microsoft IIS Web Server 6.0
1
Click Start > All Programs > Administrative Tools > Internet Information Services
(IIS) Manager.
The Internet Information Services (IIS) Manager appears.
Preparing for installation
Report any errors or omissions
51
2
In the left pane, expand <x> (local computer) and then expand the Web Sites
folder, where <x> is the name of your computer. (In the screenshot above, the
computer is named TEST.)
3
Right-click the Web site your want to configure for SSL (for example, Default
Web Site) and select Properties.
The <x> Properties dialog box appears, where <x> is the name of the Web site
you selected to configure.
4
Click the Directory Security tab.
The Directory Security tab appears.
52
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
5
In the Secure communications section, click Edit.
The Secure Communication dialog box appears.
Preparing for installation
Report any errors or omissions
53
6
Select the following:
•
Require secure channel (SSL)
•
Require 128-bit encryption
Note: Ensure Ignore client certificates is selected.
7
Click OK.
The Directory Security tab reappears.
8
Click OK.
The Inheritance Overrides dialog box appears.
54
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
9
Click OK.
You successfully enabled SSL on your Web server.
10 Restart your Web server:
a
Click Start > All Programs > Administrative Tools > Services.
b
From the main pane, select IIS Admin Service.
c
Click the Restart the service link.
Preparing for installation
Report any errors or omissions
55
Step 5: Configuring integrated Windows
authentication
After configuring SSL on your Web Server, you must configure integrated Windows
authentication. If you do not configure integrated Windows authentication, an
Entrust Entelligence Security Provider for Windows user cannot enroll for a certificate.
To configure integrated Windows authentication
1
Click Start > All Programs > Administrative Tools > Internet Information Services
(IIS) Manager.
The Internet Information Services (IIS) Manager appears.
2
In the left pane, expand <x> (local computer) and then expand the Web Sites
folder, where <x> is the name of your computer. (In the screenshot above, the
computer is named TEST.)
3
Right-click the Web site you configured for SSL (for example, Default Web Site)
and select Properties.
The <x> Properties dialog box appears, where <x> is the name of the Web site
you are configuring for integrated Windows authentication.
56
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
4
Click the Directory Security tab.
The Directory Security tab appears.
Preparing for installation
Report any errors or omissions
57
5
In the Authentication and access control section, click Edit.
The Authentication Methods dialog box appears.
58
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
6
In the Authenticated Access section, select Integrated Windows authentication.
7
Click OK to close the Authentication Methods dialog box.
8
Click OK to close the Internet Information Services (IIS) Manager dialog box.
You successfully configured integrated Windows authentication.
Preparing for installation
Report any errors or omissions
59
Step 6: Testing the SSL-enabled Web server
To ensure that your Web server has been installed and configured properly, test the
SSL connection between the Microsoft IIS Web server and a Security Provider for
Windows client browser.
To test the Web Server
From your Security Provider for Windows client, visit your sample Web site using
https in the URL instead of http. If your sample Web site appears, your Web server
and SSL are running properly. Your Web browser should indicate a secure connection
by displaying a solid key or lock icon.
Figure 3: SSL lock icon in Internet Explorer 8.0
60
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Step 7: Obtaining a certificate for
Auto-enrollment Server
Before starting the Auto-enrollment Server installation process, you must obtain a
certificate for Auto-enrollment Server. The certificate:
•
verifies signatures
•
establishes SSL connections
•
signs XAP requests for the XAP Server
•
signs files that are used by the User Registration Service (URS)
To obtain a certificate for Auto-enrollment server, you must first create an account for
the certificate in Administration Services and then enroll for the certificate using
Security Provider.
Complete the following procedures, in order:
•
“To create an account for Auto-enrollment Server in Administration
Services” on page 61
•
“To enroll for the Auto-enrollment Server certificate” on page 65
Note: If you have more than one Auto-enrollment Server machine, it is
recommended that you create a separate account for each server.
To create an account for Auto-enrollment Server in Administration Services
1
Log in to Administration Services. See “To log in to Administration Services” on
page 24 for more information.
Preparing for installation
Report any errors or omissions
61
The main page appears.
2
Click Create Account under Account Tasks in the main pane or under Tasks in the
left-hand menu.
The initial Create Account page appears.
62
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
3
From the User Type drop-down list, select Person.
4
From the Certificate Type drop-down list, select Enterprise - Admin Services User
Registration.
5
Click Submit.
A second Create Account page appears where you provide the account name
and other information.
Preparing for installation
Report any errors or omissions
63
6
From the User Information section:
a
In the First Name field, enter a first name for your Auto-enrollment Server
account (for example, AES).
b
In the Last Name field, enter any name (for example; User registration.
7
Leave the Email and Notification Email fields empty.
8
From the Group Membership section, select the member option. If no groups are
configured, only the default group appears.
9
From the Role section, select the custom role Entrust created for you from the
drop-down list (for example; <organization name> User Registration, where
<organization name> is the name of your company or organization.
10 From the Location section, click Select the searchbase and select your company
name from the drop-down list (an entry for your organization was created in the
directory when you signed up for Entrust Managed Services PKI). This specifies
where to add the Web server account in the Administration Services LDAP
directory.
11 Click Submit.
The Create Account - Complete page appears.
64
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
12 Securely record the reference number and authorization code. You need these
activation codes later during enrollment.
13 Proceed to the below procedure: “To enroll for the Auto-enrollment Server
certificate” on page 65.
To enroll for the Auto-enrollment Server certificate
1
Right-click the Security Provider icon (
for Entrust Digital ID.
) from your task bar, and select Enroll
The Enroll for Entrust Digital ID Wizard appears.
Preparing for installation
Report any errors or omissions
65
2
Click Next.
The Specify your activation codes screen appears.
66
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
3
Enter the reference number and authorization code you received in Step 12 on
page 65 and click Next.
Security Provider attempts to contact the Entrust Managed Services PKI
Certification Authority (CA) and, when successful, displays the Confirm Entrust
Digital ID Enrollment screen.
Preparing for installation
Report any errors or omissions
67
4
Click Next.
The Entrust Security Store Location dialog box appears.
68
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
5
Select a location on your machine for the security store, which stores the
certificate, and click Next. The default location is C:\Documents and
Settings\Administrator\Application Data\Entrust Security
Store.
Note: If the folder does not exist, a dialog box appears asking if you want to
create the location. Select Yes or No.
The Entrust Security Store Name dialog box appears.
Preparing for installation
Report any errors or omissions
69
6
Enter a name for your certificate (.epf file) and click Next. (For example,
AESUserReg).
The Entrust Security Store Password dialog box appears.
70
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
7
Enter a password for your certificate, following the rules listed. The red ‘x’ icons
turn to green check marks as you satisfy the requirements.
Preparing for installation
Report any errors or omissions
71
8
Click Finish.
The Completing the Enroll for Entrust Digital ID Wizard appears.
9
Click Finish.
You successfully obtained a certificate for Auto-enrollment Server and completed
all the pre-installation tasks.
72
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
3
Installing Auto-enrollment Server
This chapter describes the steps required to install and configure the Auto-enrollment
Server installation.
This chapter includes:
•
“Installing Auto-enrollment Server” on page 74
•
“Checking the Auto-enrollment Server installation” on page 86
What you should have from Entrust for the installation of
Auto-enrollment Server
Ensure you have all the items listed in the table below. If you do not, contact Entrust
Managed Services PKI.
Table 2: Install check list
Item
Have it?
Credentials to access Entrust TrustedCare
(https://secure.entrust.com/trustedcare/), which allows you to
download purchased software and related documentation
The entrust.ini file, which is needed for the installation of
Auto-enrollment Server.
73
Installing Auto-enrollment Server
The InstallShield Auto-enrollment Services Wizard installs and configures all of the
Auto-enrollment Server components. Once you have successfully run the wizard,
there are no other mandatory configuration steps.
Complete the following procedures to download Auto-enrollment Service from
Entrust TrustedCare and to install the product:
•
“To download Auto-enrollment Server from Entrust TrustedCare” on
page 74
•
“To install Auto-enrollment Services” on page 74
To download Auto-enrollment Server from Entrust TrustedCare
1
Log in to Entrust TrustedCare at https://www.entrust.com/trustedcare with your
credentials.
2
Locate the Entrust Authority Auto-enrollment Server product and select the latest
release (for example, 7.0).
3
From the Entrust Entelligence Auto-enrollment Server <version> download
page page, download the product zip under the Software heading.
Attention: Check to see if there are Service Packs and/or Patches first. If there
are, download the latest pack or patch instead.
4
Extract the zip file.
You successfully downloaded Auto-enrollment Server from Entrust TrustedCare.
To install Auto-enrollment Services
1
Open the Auto-enrollment folder you extracted in Step 4 on page 74, and
double-click the AES_<version>_win.exe file, where <version> is the most
recent version of Auto-enrollment Server (for example, 7.0).
The install wizard appears.
74
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
2
Click Next.
The license agreement screen appears.
Installing Auto-enrollment Server
Report any errors or omissions
75
3
Select I accept the terms of the license agreement and click Next.
Note: If you do not accept the terms, you cannot proceed with the installation.
The install location screen appears.
76
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
4
Browse for a location to install Auto-enrollment Server and click Next. The default
location is C:\Program Files\Entrust\AutoEnrollmentServices.
The entrust.ini location screen appears.
Installing Auto-enrollment Server
Report any errors or omissions
77
.
5
Specify the name and path to the entrust.ini file, which was provided to you
by Entrust representative, and click Next.
The Auto-enrollment Server certificate (.epf) location screen appears.
78
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
6
Specify the name and path to the Auto-enrollment certificate you created in “To
enroll for the Auto-enrollment Server certificate” on page 65 and click Next. You
selected the path in Step 5 on page 69 and the name of the .epf file in the
following step (for example: C:\Documents and
Settings\Administrator\Application Data\Entrust Security
Store\AESUserReg.epf.)
The Auto-enrollment Server certificate (.epf) password screen appears.
Installing Auto-enrollment Server
Report any errors or omissions
79
7
Enter the password for the Auto-enrollment Server certificate (.epf) you created
in “To enroll for the Auto-enrollment Server certificate” on page 65 and click
Next. You selected this password in Step 7 on page 71.
The Web server instance screen appears.
80
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
8
Select your Web site from the available list to host your Auto-enrollment Server
application, and click Next.
The Active Directory for credential storage screen appears.
Installing Auto-enrollment Server
Report any errors or omissions
81
9
Select No and click Next.
The Active Directory as certificate repository screen appears.
82
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
10 Select No and click Next.
The summary screen appears.
Installing Auto-enrollment Server
Report any errors or omissions
83
11 Read the information provided in the summary information page and click Next.
After a few moments, the wizard completes the install of Auto-enrollment Server.
84
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
12 Click Finish to exit the wizard.
You successfully installed Auto-enrollment Server.
Installing Auto-enrollment Server
Report any errors or omissions
85
Checking the Auto-enrollment Server
installation
After you have completed the Auto-enrollment Server installation, you may want to
verify the following:
•
“Verify adminservice.log file” on page 86
•
“Verify the Web server is passing requests to Auto-enrollment Server” on
page 86
•
“Verify installation log file” on page 87
•
“Verify configuration log file” on page 87
Verify adminservice.log file
The adminservice.log is the administration log file and displays Auto-enrollment
Server information and errors.
After installing Auto-enrollment Server, manually restart Auto-enrollment Server in
Windows Services. The following event appears in the adminservices.log when
services start successfully, without any errors:
[2009-07-09 10:24:25-0400][DEBUG]UserRegistrationService][URSExtension.ini][][]
Completed URS init
To verify the adminservice.log file
1
Click Start > All Programs > Administrative Tools > Services.
2
Select Entrust Authority (TM) Auto-enrollment Server from the list of services
and click Restart the service.
3
Once restarted, wait a few moments and open the adminservice.log file in a
text editor, such as Notepad. The log is located in the following directory
<install_directory>\AutoEnrollmentServices\logs\
where <install_directory> is the location of your Auto-enrollment Server
install. By default, the install location is: C:\Program Files\Entrust\.
Refer to the section “Logging configuration” on page 110 for detailed information
on the administration log file.
Verify the Web server is passing requests to Auto-enrollment
Server
After you have completed the Auto-enrollment Server installation, you should verify
that the Microsoft IIS Web Server is properly passing requests on to the
Auto-enrollment Server.
86
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
To verify the Microsoft IIS Web Server is passing requests to Auto-enrollment
Server
1
Open a browser on the machine with your Web server installed and enter the
following URL:
https://<FQDN>/AdminServicesApp/AutoEnroll
where <FQDN> is the fully qualified domain domain of the server (for example,
test.dev.ad.entrust.com).
The following information should appear:
•
SSL should be enabled
•
an error specifying that a GET request was sent to Auto-enrollment Server
Verify installation log file
The installation log file can be used for information purposes or to diagnose
installation related problems. The installer logs the following information:
•
detects environment information (for example, free space in temp directory)
•
any warnings that were issued and bypassed by the person installing the
software
•
actions performed (for example, files copied, .jar files created, and so on)
•
error information
•
InstallShield standard logging information (for example, extracting the JVM,
evaluating conditions on whether or not to run an action)
Once the installation completes, the installation log file appears in the following
location:
<install_directory>\AutoEnrollmentServices\logs\autoenrollments
ervices_installer.log
Verify configuration log file
The configuration log file can be used for information purposes or to diagnose
configuration related problems. The configuration logs the following information:
•
auto-detected environment information
•
answers to questions that the person installing the software provided
•
actions performed (for example, files copied, configuration changed, and so
on)
•
detailed error information
•
warnings
Installing Auto-enrollment Server
Report any errors or omissions
87
Once the installation completes, the configuration log file appears in the following
location:
<install_directory>\AutoEnrollmentServices\logs\autoenrollments
ervices_configuration.log
88
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
4
Customizing the Auto-enrollment
Server
You can configure the Auto-enrollment Server by modifying the ae-config.xml
and ae-defaults.xml files.
Note: For any changes to take effect, you must restart the Entrust Authority
Auto-enrollment Service in Windows Services.
This chapter describes how to customize Auto-enrollment Server:
•
“Customizing the certificate type and user role” on page 91
•
“Customizing certificate lifetimes” on page 96
•
“Customizing a user’s Distinguished Name (DN)” on page 97
•
“Customizing a search base for enrolling clients” on page 98
•
“Configuring the DNS name” on page 99
89
What you should have from Entrust for Auto-enrollment Server
customizations
Ensure you have all the item listed in the table below. If you do not, contact Entrust
Managed Services PKI.
Table 3: Auto-enrollment Server check list
Item
Have it?
Entrust Managed Services PKI Welcome letter. Specifically the names
of your
• certificate type for users and computers
• roles for users and computers
• search base for enrolling clients
90
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Customizing the certificate type and user role
Auto-enrollment Server settings can be used to choose a specific role and certificate
type for users or computers. You can choose to keep the defaults or configure new
defaults for your users and computers that are auto-enrolling.
Note: If you need to change a user or computer’s certificate type or role after
they auto-enrolled and are in the added state in Administration Services, you
must manually configure a new certificate type and role.
Configuring a default certificate type
Auto-enrollment Server uses a default certificate type for users and computers.
•
<User>ent_default</User>
The default certificate type for users.
•
<Machine>ent_default</Machine>
The default certificate type for computers.
To configure a new default certificate type, complete the following procedure.
To configure a new default certificate type
1
Open the ae-defaults.xml file in a text editor, such as Notepad:
<install_location>\AutoEnrollmentServices\config
<install_location> is the location of the Auto-enrollment Server install. By
default, the install location is C:\Program Files\Entrust.
2
Locate the following section of code:
<!-- Default cert types for user or computer auto-enrollments, for
clients that send no <CertTypeInfo> in their auto-enrollment
request -->
<DefaultCertType>
<User>ent_default</User>
<Machine>ent_default</Machine>
</DefaultCertType>
3
Replace one or both of the default certificate type settings with the certificate
types listed in your Entrust Managed Services PKI Welcome letter:
<User>ent_default</User>
<Machine>ent_default</Machine>
Some examples of valid certificate types are:
Customizing the Auto-enrollment Server
Report any errors or omissions
91
•
ent_twokeypair — two key pair user (encryption and verification)
•
ent_nonrepud — three key pair user with non-repudiation key pair
(encryption, verification, and non-repudiation)
•
ent_efs — three key pair user with EFS key pair (encryption, verification,
and encryption file system (EFS))
•
ent_nonrepud_and_efs — four key pair user with Nonrepudiation and
EFS Key Pairs (encryption, verification, nonrepudiation, and EFS)
•
ent_skp_dualusage — one dual usage key pair (dual usage)
4
Save the file.
5
Restart Auto-enrollment Server services in Windows Services.
Configuring a default User Role
The Auto-enrollment Server has a default role for your users and computers.
•
<User>End User</User>
The default user role.
•
<Machine>End User</Machine>
The default computer role.
To configure a new default role, complete the following procedure.
Note: The administrator must have permission to administer the roles that you
configure.
To configure a new default role
1
Open the ae-defaults.xml file in a text editor, such as Notepad:
<install_location>\AutoEnrollmentServices\config
<install_location> is the location of the Auto-enrollment Server install. By
default, the install location is C:\Program Files\Entrust.
2
Locate the following section of code:
<!-- Default roles for user or computer auto-enrollments, for
clients that send no <CertTypeInfo> in their auto-enrollment
request -->
<DefaultRole>
<User>End User</User>
<Machine>End User</Machine>
</DefaultRole>
92
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
3
Replace the default role settings with the roles listed in your Entrust Managed
Services PKI Welcome letter:
<User>End User</User> and/or
<Machine>End User</Machine>
Some examples of valid roles are:
•
Security Officer
•
Administrator
•
Directory Administrator
•
Auditor
•
Self-Administration Server
•
Administrator
•
End User
Note: Entrust may have created some custom roles for you. If you are unaware
of the custom roles assigned, contact your Entrust representative.
4
Save the file.
5
Restart Auto-enrollment Server services in Windows Services.
Configuring the client information setting
Auto-enrollment Server has a client information setting that controls the assignment
of the certificate type and user role when Security Provider auto-enrolls/recovers. The
client information setting is an arbitrary string that must match the string that is sent
by Security Provider. The arbitrary string is configured in the Windows Registry on the
machine that has Security Provider installed:
•
AutoEnrollUserDigitalIDType — arbitrary string used for user
auto-enrollment/recovery
•
AutoEnrollMachineDigitalIDType — arbitrary string used for
computer auto-enrollment/recovery
Auto-enrollment Server takes this string and assigns a certificate type and role to
Security Provider.
The Auto-enrollment Server administrator must be allowed to administer users that
have these roles, otherwise the enrollment will fail. For example, if the user is assigned
the Security Officer role and the Auto-enrollment administrator cannot administer
users with the Security Officer role, the enrollment will fail.
Auto-enrollment Server has a client information string that you can configure for
users and computers.
To configure a new client string, complete the following procedure.
Customizing the Auto-enrollment Server
Report any errors or omissions
93
To configure a new client string
1
Open the ae-defaults.xml file in a text editor, such as Notepad:
<install_location>\AutoEnrollmentServices\config
<install_location> is the location of the Auto-enrollment Server install. By
default, the install location is C:\Program Files\Entrust.
2
Locate the following section of code:
<!-- CertTypeInfo controls the assignment of certificate type and
user role when a client enrolls. Edit as required. ClientInfo
strings are arbitrary but must match the string that the client
sends. If a ClientInfo string is repeated, AE uses the first
encountered.
AE server assigns a <CertType> and <Role> to a client that sends a
particular <ClientInfo> string. The AE Server admin must be
allowed to administer users that have these roles; otherwise
enrollment will fail. -->
<CertTypeInfo>
<ClientRequest>
<ClientInfo>some_clients_send_this_string</ClientInfo>
<CertType>ent_default</CertType>
<Role>End User</Role>
</ClientRequest>
<ClientRequest>
<ClientInfo>other_clients_send_this_different_string</ClientInfo>
<CertType>ent_skp_dualusage</CertType>
<Role>Server Login</Role>
</ClientRequest>
</CertTypeInfo>
Security Provider sends a client request to Auto-enrollment Server. The request
contains an arbitrary string that was configured in the
AutoEnrollUserDigitalIDType Windows registry on the machine that has
Security Provider installed. In this case, the Security Provider registry setting is
AutoEnrollUserDigitalIDType=some_clients_send_this_string
Auto-enrollment Server looks to see if this matches the arbitrary string in the
<ClientInfo> tags. In this code example, the <ClientInfo> tags in the do
contain the same string:
<ClientInfo>some_clients_send_this_string</ClientInfo>
3
94
Change the <CertType> and <Role> as required.
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Auto-enrollment Server reads the <CertType> and <Role> tags to determine
which certificate type and role to use for the auto-enrollment. In this code
example, the <CertType> is ent-default and the <Role> is End User.
Note: If the string sent in the Security Provider request does not match a string
in any of the <ClientInfo> tags, an error is logged and returned to the client.
The default certificate type and role are used when the client does not send any
<ClientInfo> string at all, or no <ClientTypeInfo> is configured at the
server.
4
Save the file.
5
Restart Auto-enrollment Server services in Windows Services.
Customizing the Auto-enrollment Server
Report any errors or omissions
95
Customizing certificate lifetimes
You can configure the ae-defaults.xml file to set certificate lifetimes for users or
computers. You can choose to keep the defaults or configure new defaults for your
users and computers that are auto-enrolling.
Note: The certificate lifetimes settings in the <CertificatePolicy> section
override the default certificate lifetime settings in the CA. To use the default
settings, delete or comment out the settings in the <CertificatePolicy>
section.
To configure the certificate lifetimes, complete the following procedure.
To configure certificate lifetimes
1
Open the ae-defaults.xml file in a text editor, such as Notepad:
<install_location>\AutoEnrollmentServices\config
<install_location> is the location of the Auto-enrollment Server install. By
default, the install location is C:\Program Files\Entrust.
2
Locate the following section of code:
<!-- Example of a CertificatePolicy. Edit as required, or remove
it to get default policy associated with the user Role. -->
<CertificatePolicy>
<EncLifetime>36</EncLifetime>
<VerLifetime>36</VerLifetime>
<SignLifePercentage>70</SignLifePercentage>
</CertificatePolicy>
96
3
To change the lifetime (in months) of encryption certificates, change the
<EncLifetime> value. You can specify a value between 2 and 420 months (35
years).
4
To change the lifetime (in months) of vertification certificates, change the
<VerLifetime> value. You can specify a value between 2 and 420 months (35
years).
5
To change the percentage of the signing private key lifetime, which determines
when a user’s key pair requires updating, change the <SignLifePercentage>
value. You can specify a value from 1 to 100 (percent).
6
Save the file.
7
Restart Auto-enrollment Server services in Windows Services.
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Customizing a user’s Distinguished Name (DN)
Auto-enrollment Server uses the DN builder implementation
(DistinguishedNameBuilderImpl) by default, to automatically create a user’s or
computer’s distinguished name (DN), common name (CN), and surname from the
information in the Security Provider request. If you are using a Microsoft Active
Directory as your certificate repository, the default
DistinguishedNameBuilderImpl attempts to read the client’s distinguished
name (DN), common name (CN), surname, email address, and UPN from that
directory.
The default DistinguishedNameBuilderImpl builds a distinguished name (DN)
for Security Provider by using the following:
•
common name (cn) — client’s authenticated Windows account name
•
surname — Windows domain
•
search bases — uses the search bases that are configured in the
ae-defaults.xml file
The default also sets a dNSName as a subjectAltName extension for computer
enrollments. In addition, it sets an otherName as a subjectAltName extension if
the client machine is a domain controller. The otherName has the domain controller
GUID.
The default does not set a subjectAltName extension for user enrollments, unless
you are using Active Directory as the certificate repository. However, there is sample
code that you can use to customize the DN builder implementation to set a
subjectAltName.
If you are using Active Directory as the repository for user or machine enrollments,
the default DistinguishedNameBuilderImpl reads the client’s email address and
UPN from the directory and sets them into the subjectAltName extension.
Note: If you need to change a user or computer’s DN after they have
auto-enrolled and are in the Added state in Administration Services, you must
manually configure a new DN.
Refer to Appendix A “Writing your own DN Builder implementation code” on
page 131 for further information about the code that you can use to create your own
DN builder implementation.
Customizing the Auto-enrollment Server
Report any errors or omissions
97
Customizing a search base for enrolling clients
Security Provider is enrolled on the search bases that are set for users or machines in
the <DNBuilderSearchBase> setting in the ae-defaults.xml file. If no search
bases are provided, the client is enrolled on the search base where the
Auto-enrollment Server administrator resides. However, with Active Directory the
client’s account is already in the directory and the enrollment uses that DN, instead
of the <DNBuilderSearchBase> setting. Consult your Entrust Managed Services
PKI Welcome letter for more information.
Note: If you need to change a user or computer’s search base after they have
auto-enrolled and are in the Added state in Administration Services, you must
manually configure a new search base.
Complete the following procedure to configure the search base value.
To configure the search base value
1
Open the ae-defaults.xml file in a text editor, such as Notepad:
<install_location>\AutoEnrollmentServices\config
<install_location> is the location of the Auto-enrollment Server install. By
default, the install location is C:\Program Files\Entrust.
2
Locate the following section of code:
<!-- The search base under which clients will be enrolled. This
is optional. If you omit it, the CA search base will be used. -->
<DNBuilderSearchBase>
<User></User>
<Machine></Machine>
</DNBuilderSearchBase>
3
To configure a search base for
•
users, add your search base value to the <User> setting.
•
computers, add a search base value to the <Machine> setting.
Attention: The <User> and <Machine> settings are not used if Active
Directory is the certificate repository. These settings may be used if Active
Directory is the Windows account repository.
98
4
Save the file.
5
Restart Auto-enrollment Server services in Windows Services.
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Configuring the DNS name
Auto-enrollment Server attempts to locate a Domain Name System (dNSName) for
the auto-enrollment. If the dNSName lookup fails, as a back up you can configure a
setting so that Auto-enrollment Server knows what dNSName to assign to
authenticated clients from a particular Windows domain.
Complete the following procedure to configure the dNSName.
To configure the DNS name
1
Open the ae-defaults.xml file in a text editor, such as Notepad:
<install_location>\AutoEnrollmentServices\config
<install_location> is the location of the Auto-enrollment Server install. By
default, the install location is C:\Program Files\Entrust.
2
Locate the following section of code:
<!-- List of accepted clients -->
<DomainList>
<Domain>
<Windows>Your_Windows_domain_name</Windows>
<DNS>Your_DNS_name</DNS>
</Domain>
</DomainList>
3
Change the value in the <DNS>Your_DNS_name</DNS> setting to reflect your
organization’s dNSName domain value. In the example below, the domain is
example_hq but the dNSName is example.com. The ae-defaults.xml file
can be customized to always map example_hq to example.com:
<!-- List of accepted clients -->
<DomainList>
<Domain>
<Windows>example_hq</Windows>
<DNS>example.com</DNS>
</Domain>
</DomainList>
4
Save the file.
5
Restart Auto-enrollment Server services in Windows Services.
Customizing the Auto-enrollment Server
Report any errors or omissions
99
100
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
5
Configuring queuing
Queuing is an optional feature of Auto-enrollment Server. The main purpose of
queuing is to allow an Auto-enrollment Server administrator to approve or reject
auto-enrollment/recovery requests.
If you opted for the queuing feature, it was automatically added by Entrust as a
permission to the role you selected when you created the Auto-enrollment Server
certificate (“Step 7: Obtaining a certificate for Auto-enrollment Server” on page 61).
If you desire this feature at a later time, contact your Entrust representative.
When your organization wants to use queuing, you must configure all of the
following:
•
“Enabling queuing in Auto-enrollment Server” on page 102
•
“Approving or rejecting requests in Administration Services” on page 105
101
Enabling queuing in Auto-enrollment Server
To enable queuing in Auto-enrollment Server, you must configure the
ae-defaults.xml file. use the following two procedures to configure the
Auto-enrollment Server’s ae-defaults.xml file:
•
“Configuring the ae-defaults.xml file to queue requests” on page 102
•
“Configuring the queuing monitor” on page 103
Configuring the ae-defaults.xml file to queue requests
The default, queuing is disabled (NoQueue) in the ae-defaults.xml file. To enable
queuing, you must change the NoQueue value to Force.
Note: If Entrust has not configured the Auto-enrollment Services account role
with the queue permission, setting the <Enroll> or <Recover> settings to
Force will fail.
Complete the following procedure to enable queuing in the ae-defaults.xml file.
To enable queuing in the ae-defaults.xml file
1
On the machine with Auto-enrollment Server installed, open the
ae-defaults.xml file in a text editor:
<install_location>\AutoEnrollmentServices\config
<install_location> is the location of the Auto-enrollment Server install. By
default, the install location is C:\Program Files\Entrust.
2
Locate the following section of code in the ae-defaults.xml file:
<!-- "Force"=queue the operation (fails if the URS admin's user
role does not permit queuing) -->
<!-- "NoQueue"=do not queue (fails if the URS admin's user role
requires queuing) -->
<QueueMode>
<Enroll>NoQueue</Enroll>
<Recover>NoQueue</Recover>
</QueueMode>
102
3
Change the NoQueue value to Force in the <Enroll>NoQueue</Enroll>
and/or <Recover>NoQueue</Recover> settings.
4
Save the changes to the ae-default.xml file.
5
Restart Auto-enrollment Server services in Windows Services for the changes to
take effect:
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
a
Click Start > All Programs > Administrative Tools > Services.
b
Select Entrust Authority (TM) Auto-enrollment Server from the list of
services and click the Restart the service link.
You successfully enabled queuing in the ae-defaults.xml file.
Configuring the queuing monitor
Auto-enrollment Server has a queuing monitor that fetches a list of queued requests.
Auto-enrollment Server caches this list and uses it to determine if there have been any
previous cancelled requests. Since identical requests are allowed to be queued after
the administrator has cancelled the initial identical request, the queuing monitor
solves this by preventing repeated identical requests from being forwarded.
Requests that are queued are logged into the adminservices.log file when
Auto-enrollment Server starts up or whenever the Auto-enrollment Server’s queued
request list cache is refreshed.
The queued request list is cached for a configurable time interval, which is set using
the <QueueRefreshTime> setting in the ae-defaults.xml file. The default
<QueueRefreshTime> time interval is 1800 seconds (30 minutes). You cannot set
the time interval to less than 10 seconds, as it impacts performance. If you attempt
to do so, Auto-enrollment Server uses 10 seconds as the default in order to avoid a
decline in performance.
It is important that you configure the queued list to be fetched before Security
Provider repeats the request. Security Provider uses the following settings to
determine the interval at which it sends the auto-enrollment/recovery requests:
•
CertUpdateInterval: The interval specified for the Digital ID Monitor,
which requests the auto-enrollment/recovery for user digital IDs.
•
MachineCertUpdateInterval. The interval specified for the Entrust
Entelligence Machine Digital ID Service (EEMDIS), which requests the
auto-enrollment/recovery for computer digital IDs.
By default, the CertUpdateInterval and MachinCertUpdateInterval both
perform auto-enrollment/recovery requests every 12 hours. These defaults are
configurable in the Microsoft Windows Registry on the machine in which the Security
Provider client is installed. See the Entrust Entelligence Security Provider for Windows
Administration Guide for more information.
Complete the following procedure if you want to change the default queue time
interval.
To configure the queuing monitor
1
On the machine with Auto-enrollment Server installed, open the
ae-defaults.xml file in a text editor:
<install_location>\AutoEnrollmentServices\config
Configuring queuing
Report any errors or omissions
103
where <install_location> is the location of the Auto-enrollment Server
install. By default, the install location is C:\Program Files\Entrust.
2
Locate the following section of code in the ae-defaults.xml file:
<!-- The time interval at which AE Server fetches the request
queue from the Security Manager (seconds). It must be smaller than
the time between repeated requests from any one particular client.
The ESP client default is 12 hours. -->
<!-- This setting is not used unless QueueMode is set to 'Force'.
-->
<QueueRefreshTime>1800</QueueRefreshTime>
3
Change the QueueRefreshTime value to a value of your choosing, in seconds,
in the <QueueValueRefreshTime>1800</QueueRefreshTime> setting.
Attention: If you configure the <QueueRefreshTime> to fetch the list of
queued requests too frequently, this will degrade the performance of your
Auto-enrollment Server.
4
Save the changes to the ae-default.xml file.
5
Restart Auto-enrollment Server services in Windows Services for the changes to
take effect:
a
Click Start > All Programs > Administrative Tools > Services.
b
Select Entrust Authority (TM) Auto-enrollment Server from the list of
services and click the Restart the service link.
You successfully configured the queuing monitor in the ae-defaults.xml file.
104
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Approving or rejecting requests in
Administration Services
Once you have logged in to Administration Services using the Administrator Login,
you can approve, cancel, or cancel and delete pending auto-enrollment/recovery
requests. When an administrator
•
Approves an auto-enrollment/recovery request, the request is submitted for
processing. When the administrator’s approval completes, authorization
codes are sent to the Security Provider for Windows client. If the queue
request requires approval by several administrators, the request remains
queued until all administrators have approved the request.
•
Cancels a queued auto-enrollment/recovery request, an identical request
cannot be queued.
•
Cancels and deletes a queued auto-enrollment/recovery request, a new
identical request can be queued.
To approve, cancel, or cancel and delete pending auto-enrollment/recovery
request
1
Log in to Administration Services. See “To log in to Administration Services” on
page 24 for more information
Configuring queuing
Report any errors or omissions
105
the following page appears.
2
Click Approve Pending Requests in the left pane under Tasks, or from the main
pain under Request Tasks.
The Approve Pending Requests page displays, with a list of all requests that are
currently in the queue.
3
To view detailed information on a request, click the request name. A new browser
window opens with a list of relevant information on the request.
4
Select an auto-enrollment/recover request that you want to process.
5
Select one of the following actions for the chosen request:
•
Approve
Approving a request allows it to be submitted for processing. If the request
needs approval by more than one administrator, the request is submitted for
processing only after all administrators have approved the request.
•
Cancel
Cancelling a request removes the request from all Approve Pending Request
pages. An identical request cannot be queued.
•
106
Cancel and Delete
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Cancel and Delete removes the request from all request pages and all
queues. An identical request can be queued.
You may also want to view the List Requests page. This page allows you to quickly
view a list of all approved, cancelled, completed, or expired requests, up to the
maximum number allowed by the system. To display information on a specific
request, click the request name and a list of relevant information will be displayed.
Note: When an administrator deletes a request (Cancel and Delete), these
deleted requests are removed from the List Requests page.
Configuring queuing
Report any errors or omissions
107
108
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
6
Troubleshooting
This section includes troubleshooting information and information on using the
Auto-enrollment Server log service.
•
“Logging configuration” on page 110
•
“Time synchronization” on page 115
•
“Error messages” on page 116
109
Logging configuration
The Auto-enrollment Server uses the Entrust Common Logger which is found in the
entlogger.jar file.
The Auto-enrollment Server’s logging is configured in the Logging parameters
section of the ae-config.xml file:
<!-- Logging parameters -->
<parameter name="log.level" value="TRACE"/>
<parameter name="log.file" value="C:\Program
Files\Entrust\AutoEnrollmentServices\logs\adminservices.log"/>
<parameter name="log.file.size" value="1000000"/>
<parameter name="log.file.num" value="10"/>
<parameter name="log.file.maxmessagelength"
value="1000"/>
Attention: Any time you make a change to the ae-config.xml file, you must
restart Auto-enrollment Server in Windows Services.
Setting the log level
The log contents file adminservices.log is created according to the log level set
in the ae-config.xml file.
Entrust Common Logger supports the following log levels:
•
TRACE
•
DEBUG
•
INFO
•
WARNING
•
ERROR
•
ALERT
•
FATAL
Successful enrollments or recoveries are logged at the TRACE, DEBUG, and INFO log
levels. Failures of enrollments or recoveries are logged at the TRACE, DEBUG, INFO,
and ERROR levels.
By default, the log level is set to TRACE.
Complete the following procedure to set the log level.
110
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
To set the log level
1
On the machine with Auto-enrollment Server installed, open the
ae-config.xml file in a text editor:
<install_location>\AutoEnrollmentServices\config
where <install_location> is the location of the Auto-enrollment Server
install. By default, the install location is C:\Program Files\Entrust.
2
Locate the following section of code in the ae-defaults.xml file:
<!-- Logging parameters -->
<parameter name="log.level" value="TRACE"/>
<parameter name="log.file" value="C:\Program
Files\Entrust\AutoEnrollmentServices\logs\adminservices.log"/>
<parameter name="log.file.size" value="1000000"/>
<parameter name="log.file.num" value="10"/>
<parameter name="log.file.maxmessagelength"
value="1000"/>
3
Change the value parameter in the following line to the log level of your choice:
<parameter name="log.level" value="TRACE"/>
Log levels include:
•
TRACE
•
DEBUG
•
INFO
•
WARNING
•
ERROR
•
ALERT
•
FATAL
4
Save the file.
5
Restart Auto-enrollment Server in Windows Services.
Setting the log file location
The adminservices.log file location is set in the ae-config.xml file under the
log.file parameter name. The log file location is specified by the full path and
name of the log file. By default, the log file is installed in this location:
C:\Program Files\Entrust\AutoEnrollmentServices\logs\adminservices.log
Complete the following procedure to change the file location of the
adminservices.log file.
Troubleshooting
Report any errors or omissions
111
To change the location of the adminservices.log file
1
On the machine with Auto-enrollment Server installed, open the
ae-config.xml file in a text editor:
<install_location>\AutoEnrollmentServices\config
where <install_location> is the location of the Auto-enrollment Server
install. By default, the install location is C:\Program Files\Entrust.
2
Locate the following section of code in the ae-config.xml file:
<!-- Logging parameters -->
<parameter name="log.level" value="TRACE"/>
<parameter name="log.file" value="C:\Program
Files\Entrust\AutoEnrollmentServices\logs\adminservices.log"/>
<parameter name="log.file.size" value="1000000"/>
<parameter name="log.file.num" value="10"/>
<parameter name="log.file.maxmessagelength"
value="1000"/>
3
From the log.file parameter, change the value representing the file location
to the full file path of your choice:
<parameter name="log.file" value="C:\Program
Files\Entrust\AutoEnrollmentServices\logs\adminservices.log"
/>
4
Save the file.
5
Restart Auto-enrollment Server in Windows Services.
Setting the maximum log file size
The maximum log file size is set in the ae-config.xml file, under the
log.file.size parameter name. The maximum log file size is specified in bytes. By
default, the maximum log file size is 1000000 bytes.
Complete the following procedure to set the maximum log file size.
To set the maximum log file size
1
On the machine with Auto-enrollment Server installed, open the
ae-config.xml file in a text editor:
<install_location>\AutoEnrollmentServices\config
where <install_location> is the location of the Auto-enrollment Server
install. By default, the install location is C:\Program Files\Entrust.
2
Locate the following section of code in the ae-config.xml file:
<!-- Logging parameters -->
112
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
<parameter name="log.level" value="TRACE"/>
<parameter name="log.file" value="C:\Program
Files\Entrust\AutoEnrollmentServices\logs\adminservices.log"/>
<parameter name="log.file.size" value="1000000"/>
<parameter name="log.file.num" value="10"/>
<parameter name="log.file.maxmessagelength"
value="1000"/>
3
From the log.file.size parameter, change the value to the log file size of
your choice, in bytes:
<parameter name="log.file.size" value="1000000"/>
4
Save the file.
5
Restart Auto-enrollment Server in Windows Services.
Setting the number of backup log files allowed
The maximum number of backup log files allowed is set in the ae-config.xml file,
under the log.file.num parameter name. By default, the maximum number of
backup log files allowed is 10.
When the adminservices.log is full a new log file is created. The next file is
appended with the number 1. For example, adminservices.log.1. As each file
becomes full, the number is incremented by 1. For example, when the
adminservices.log.1 file is full, the adminservices.log.2 file is created.
These files will be created until the maximum number of backup log files allowed is
reached. When the maximum number of backup log files is reached, the previous files
will be overwritten, beginning with the adminservices.log file.
Complete the following procedure to set the number of backup log files allowed.
To set the number of backup files allowed
1
On the machine with Auto-enrollment Server installed, open the
ae-config.xml file in a text editor:
<install_location>\AutoEnrollmentServices\config
where <install_location> is the location of the Auto-enrollment Server
install. By default, the install location is C:\Program Files\Entrust.
2
Locate the following section of code in the ae-config.xml file:
<!-- Logging parameters -->
<parameter name="log.level" value="TRACE"/>
<parameter name="log.file" value="C:\Program
Files\Entrust\AutoEnrollmentServices\logs\adminservices.log"/>
<parameter name="log.file.size" value="1000000"/>
Troubleshooting
Report any errors or omissions
113
<parameter name="log.file.num" value="10"/>
<parameter name="log.file.maxmessagelength"
value="1000"/>
3
From the log.file.num parameter, change the value to a value of your choice:
<parameter name="log.file.num" value="10"/>
4
Save the file.
5
Restart Auto-enrollment Server in Windows Services.
Setting the maximum message length
The maximum message length for a log message is set in the ae-config.xml file,
under the log.file.maxmessagelength parameter name. By default, the
maximum message length for a log message is 1000 characters.
Complete the following procedure to set the maximum message length.
To set the maximum message length
1
On the machine with Auto-enrollment Server installed, open the
ae-config.xml file in a text editor:
<install_location>\AutoEnrollmentServices\config
where <install_location> is the location of the Auto-enrollment Server
install. By default, the install location is C:\Program Files\Entrust.
2
Locate the following section of code in the ae-config.xml file:
<!-- Logging parameters -->
<parameter name="log.level" value="TRACE"/>
<parameter name="log.file" value="C:\Program
Files\Entrust\AutoEnrollmentServices\logs\adminservices.log"/>
<parameter name="log.file.size" value="1000000"/>
<parameter name="log.file.num" value="10"/>
<parameter name="log.file.maxmessagelength"
value="1000"/>
3
From the log.file.maxmessagelength parameter, change the value to a
value of your choice:
<parameter name="log.file.maxmessagelength" value="1000"/>
114
4
Save the file.
5
Restart Auto-enrollment Server in Windows Services.
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Time synchronization
The time on the computer on which the Auto-enrollment Server runs must be
synchronized with the certification authority (CA) time. This allows replay attacks to
be detected on messages sent from the Auto-enrollment Server to the CA using the
XAP protocol. For this reason, the Auto-enrollment Server will not start properly if the
time difference is greater than five minutes.
The error appears in the adminservices.log file as follows:
[2009-07-10
14:41:01-0400][DEBUG][UserRegistrationService][URSExtension.ini
t][][] com.entrust.adminservices.urs.URSException: (URS0100) An
error occurred in the User Registration Service. Caused by:
com.entrust.adminservices.urs.autoenroll.AutoEnrollException:
(AES0103) Failed to get an administration services context for
communicating with the CA. Caused by:
com.entrust.adminservices.toolkit.internal.xap.XAPException:
(atkxap.XAP.2006) The XAP message has an expired timestamp. The
message contained a timestamp that was outside the server's
acceptance window. Make sure that the source used to obtain
message timestamps is synchronized with the server's time.
Synchronize the Auto-enrollment Server machine time setting to within a five minute
window of the Entrust CA. Contact Entrust for more information.
Troubleshooting
Report any errors or omissions
115
Error messages
For a complete list of Auto-enrollment Server errors and possible solutions, refer to
the Entrust Authority Auto-enrollment Server Error Message document, available for
download from Entrust TrustedCare at https://secure.entrust.com/trustedcare/.
116
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Glossary
Glossary of terms
Term
Definition
activation codes
The “reference number” and “authorization code” that are generated
when an administrator adds or recovers a user using Administration
Services, or when users add or recover themselves using Entrust
Entelligence Security Provider for Windows with the Auto-enrollment
Server.
Active user
An “end user” who has created an “Entrust digital ID” and is ready to use
their Entrust desktop application. When you create accounts for users,
“activation codes” are generated. These activation codes are used by end
users to enroll their certificates. Once users enroll, they are considered
active or activated users.
Added user
An “end user” who has had their account created by an Administrator in
Administration Services, but who has not yet enrolled for their certificate
administrator
An Administrator (with an uppercase “a”) is a trusted person who uses
Administration Services to create user accounts and to do other frequent
operations, such as deactivate users, revoke a user’s keys, set up users for
“key recovery”, and create new encryption key pairs for users.
ALERT
An Entrust error level that logs messages regarding conditions you need to
correct immediately. For example, a corrupt system database.
attribute
A piece of information that describes an aspect of a “directory” entry.
Entries are the building blocks of the Directory. Each attribute consists of an
attribute type and at least one attribute value. For example, one attribute
type is “cn”, and its attribute value could be “Alice”.
117
118
Term
Definition
authentication
The process of proving your identity. In Entrust, authentication works
through a password-protected encrypted file, called the “Entrust digital
ID”. This digital ID contains a user’s identity (“Distinguished Name (DN)”),
the “decryption private key”, any signing keys, and the CA signing keys.
When users log into an Entrust desktop application, they choose their
Entrust digital ID and enter their password. This process verifies their
identity and allows them to access their private data.
authorize
The act of approving an administrative “sensitive operation” (for example,
creating a “digital ID”), by entering the password of an “administrator”.
authorization
code
An alphanumerical code (for example, CMTJ-8VOR-VFNS) generated
when an administrative user creates a new user or recovers an existing user,
required along with its corresponding “reference number”. Authorization
codes can only be used once.
CA
See “Certification Authority (CA)”
CA certificate
A “certificate” issued by a “Certification Authority (CA)” containing the
“CA verification public key”. The Web server and a user’s browser must
import this certificate and use the verification public key contained within it
to verify the CA signature on Web server and browser certificates when
setting up a secure session (see “Secure Sockets Layer (SSL)”).
CA issuer
The entity (often the “Certification Authority (CA)” itself) that distributes
the “CA certificate”.
CA signing key
pair
The “key pair” of the “Certification Authority (CA)”. It consists of the “CA
signing private key” and “CA verification public key”.
CA signing
private key
The private key portion of the “CA signing key pair”. The “Certification
Authority (CA)” signing private key is used to digitally sign client (for
example, browser and Web server) certificates. The signature on these
certificates can be verified with the “CA verification public key”. A CA signs
all certificates it issues using the CA signing key.
CA verification
public key
The public key portion of the “CA signing key pair”. It verifies client
certificates that have been signed by the “CA signing private key”.
cache
A temporary area for information storage, such as user information, used to
improve system performance.
CAPI
See “CryptoAPI”.
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Term
Definition
certificate
A collection of publicly available information in standard format about an
entity that is digitally signed by the “Certification Authority (CA)”. A
certificate is used to uniquely identify people and resources over networks
such as the Internet. Certificates also enable secure, confidential
communication between two parties (see “Secure Sockets Layer (SSL)”).
A certificate typically includes a variety of information pertaining to its
owner and to the CA that issued it, including the name of the holder and
other holder identification information (for example, the URL of the Web
server using the certificate or an email address), the holder’s public key, the
name of the Certification Authority that issued the certificate, a serial
number, and the validity period (or lifetime) of the certificate (a start and an
end date).
The CA issues all certificates according to the format and structure of the
X.509 version 3 standard.
certificate
category
A group to which a “certificate” belongs (for example, Enterprise, VPN,
Web, policy, and so on) that indicates its purpose. Each category can
contain one or more certificate types (see “certificate type”).
certificate expiry
The date after which a user’s “certificate” should no longer be trusted.
certificate
revocation
See “revoking certificates”
Certificate
Revocation List
(CRL)
A signed and timestamped “certificate” containing the serial numbers of
public key certificates that have been revoked, and a reason for each
revocation.
certificate store
Contains user and machine certificates, and keeps track of the
“Cryptographic Service Provider (CSP)” associated with each “certificate”.
certificate type
The information that determines how a “certificate” is customized when
issued.
certificate
validation
The process of verifying the trustworthiness of a “certificate” by checking
that the certificate has not been tampered with, is not revoked, and was
issued by a “Certification Authority (CA)” you “trust”.
Certification
Authority (CA)
The CA ensures the trustworthiness of electronic identities. It issues
electronic identities in the form of public key certificates, policy certificates,
cross-certificates, certificate revocation lists (see “Certificate Revocation List
(CRL)”), and Authority Revocation Lists (ARL), and signs the certificates
with its signing key to ensure the integrity of the electronic identity.
See “certificate”.
client
(application)
An application running as a desktop agent that receives information from a
server application and requests a service provided by the server application.
For example, the Entrust Entelligence Security Provider for Windows client.
Glossary of terms
Report any errors or omissions
119
Term
Definition
client
authentication
The authentication whereby users prove their identity to the server, using,
(for example) Entrust Entelligence Security Provider for Windows.
computer
A Security Provider for Windows client that is a machine with no end user.
This machine can communicate with the Auto-enrollment Server to enroll
or recover an Entrust digital ID for computer.
credentials
1) A set of data in a generic “Public Key Infrastructure (PKI)” that defines
an entity and contains a user's critical information, or keying material. An
“Entrust digital ID” is a specific type of credentials.
2) A set of data (for example, a username and password or certificate) that
defines a user to the system.
credentials file
A set of critical information about a user of a PKI. In Entrust Managed
Services PKI, a user's credentials file is usually stored in a “.epf file”. The
“Server Login” credentials file is a “.ual file”.
CRL
See “Certificate Revocation List (CRL)”.
CRL check
The inspection of a “Certificate Revocation List (CRL)” (accessed from the
“directory”) by another user to check the trustworthiness of the certificates
of the users they intend on encrypting files for.
CryptoAPI
Cryptographic Application Programming Interface or CAPI. The Microsoft
Windows API that provides PKI client capabilities to the desktop operating
system, allowing applications to take advantage of desktop cryptographic
functionality built in by Microsoft.
CAPI has two layers. An interface layer is exposed to the client applications.
Underneath is a layer of drivers that perform the cryptographic functions
such as encrypting and hashing. The drivers are called Cryptographic
Service Providers (see “Cryptographic Service Provider (CSP)”).
120
Cryptographic
Service Provider
(CSP)
An interface between Microsoft “CryptoAPI” and private key stores (see
“key store”), that performs all cryptographic operations for Microsoft
applications and any third-party applications that are properly built on the
Windows security framework, such as encrypting and decrypting data,
verifying signatures, signing data, and verifying certificates.
CSP
See “Cryptographic Service Provider (CSP)”.
CSP type
A “Cryptographic Service Provider (CSP)” type. A group of organized CSPs
with each group having its own set of data formats.
database
A database (for example, an Informix database) that stores information
about users and the “Certification Authority (CA)”. The data is encrypted
and protected by passwords.
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Term
Definition
deactivate
The process of rendering a user incapable of using Entrust. This state is
reversible, you can reactivate users later if their certificates have not been
revoked (see “revoking certificates”).
deactivated user
A user whose information is temporarily removed from the corresponding
“directory” entry. The database, however, retains a copy of this information
so a deactivated user can be easily reactivated later. For example, you
deactivate users when they take a leave of absence.
A deactivated user cannot log in to any Entrust application. Deactivating a
user increases the number of available licenses by one.
DEBUG
An Entrust error level that logs messages relating to the system and used
only when debugging the software.
decrypt
The act of restoring an encrypted file to its original, unprotected state.
decryption private The key that decrypts data that has been encrypted with its corresponding
“encryption public key”. For example, Bob is the only user who has access
key
to his decryption private key, which he uses to decrypt information that has
been encrypted for him by other users with his encryption public key.
DES
Data Encryption Standard. A NIST-standard algorithm that uses a 56 bit key.
Refer to FIPS PUB 46-2 (http://www.itl.nist.gov/fipspubs/fip46-2.htm).
desktop user
The user whose Entrust “digital ID” is stored in an Entrust desktop security
store, located in an “.epf file”.
digital ID
The set of cryptographic data that defines an entity, consisting of a public
portion (user’s public certificates) and a private portion (user’s private keys),
and can be used to verify one’s identity.
digital signature
A guarantee to a recipient that the signed file came from the person who
sent it, and that it was not altered since it was signed. Any other user who
has the corresponding “verification public key” can verify the signature. A
digital signature is the result of making a hash of the data and encrypting
the hash using a user’s “signing private key”.
directory
An LDAP-compliant directory service that contains the name of all users
(see and that acts as repository for user “encryption public key” certificates.
Distinguished
Name (DN)
The complete name of a Directory entry that uniquely identifies a person or
entity. DNs of all users are stored in the “directory”.
DN
See “Distinguished Name (DN)”.
domain
1) CA domain.
2) The address or registration category of a Web site.
Glossary of terms
Report any errors or omissions
121
Term
Definition
encrypt
The act of rendering a file completely unreadable. This means no one,
including the owner of the file, can read the file’s contents until it is
decrypted. Only the owner and the authorized recipients can “decrypt” the
file. The owner determines authorized recipients.
encryption key
pair
The key pair that contains an “encryption public key” and associated
“decryption private key”.
encryption public
key
The key that encrypts data that can be decrypted with the corresponding
“decryption private key”. See “encrypt”.
end user
A user who has successfully enrolled for an “Entrust digital ID” using an
application such as “Security Provider for Windows”.
enrollment
The process by which an enterprise delivers managed Entrust keys and
certificates to an “end user” or “computer”, in the form of an “Entrust
digital ID”.
Entrust certificate
file
The file that contains the necessary information to ensure that files
encrypted and signed by someone using an Entrust desktop application in
one CA domain can be encrypted and verified by someone using an Entrust
desktop application in a non-cross-certified CA domain.
All users export their own certificate file and import any user’s certificate
file. The filename comprises a user name with a .key extension (for
example, Alice Gray.key).
122
Entrust desktop
security store
See “.epf file”.
Entrust digital ID
A “digital ID” that is created, protected, and managed by Entrust and
stored in an “Entrust security store” and/or a “third-party security store”.
Entrust profile
See “Entrust digital ID”.
Entrust roaming
security store
A password protected “Entrust security store” file that is located in a
“directory” and accessed only when user’s computer is connected to
Roaming Server.
Entrust security
store
A password protected file that acts as a storage medium for a user’s “Entrust
digital ID” when created with an Entrust “Cryptographic Service Provider
(CSP)”.
entrust.ini file
The file that contains important system configuration data that Entrust
clients need in order to run. Entrust distributes this file to administrators.
.epf file
A password protected “Entrust security store” file that is located on user’s
desktop computer. Also known as “Entrust desktop security store”.
ERROR
An Entrust error level that logs messages about non-fatal errors, that
should, nevertheless, be resolved. For example, application errors.
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Term
Definition
FATAL
An Entrust error level that logs messages about fatal errors, that must be
resolved.
Globally Unique
Identifier (GUID)
A method for computing object identifiers (OIDs) from Microsoft.
GUID
See “Globally Unique Identifier (GUID)”.
hardware token
See “Hardware Security Module (HSM)”.
Hardware Security A hardware device used to generate key pairs (see “key pair”), store the
“private key”, and generate digital signatures (see“digital signature”).
Module (HSM)
For information about security hardware support and Entrust products,
refer to the www.entrust.com for a complete list of Entrust supported
hardware tokens, smart cards, biometrics, and other security devices.
HTTP
HyperText Transfer Protocol. A transport protocol to access an unsecured
Web server.
HTTPS
HyperText Transfer Protocol Secure. A transport protocol used to access a
secure Web server through a secure port number. See “Secure Sockets
Layer (SSL)”.
IIS
See “Internet Information Server (IIS)”.
INFO
An Entrust error level that logs informational messages.
Internet
Information
Server (IIS)
A Microsoft Web server application.
Java Virtual
Machine (JVM)
The part of the Web browser that executes Java applets.
JVM
See “Java Virtual Machine (JVM)”.
key
A special number that an encryption algorithm uses to change data, making
that data secure.
key backup
The process of maintain a user’s decryption keys (see “decryption private
key”).
key history
A collection of decryption private keys belonging to a user, stored by Entrust
Managed Services PKI
key lifetime
The length of time a “key” is valid. All keys have a specific lifetime except
the “decryption private key” which never expires.
Glossary of terms
Report any errors or omissions
123
Term
Definition
key management
Operations that involve:
• updating all user key pairs (see “key pair”) automatically and regularly
• storing the complete history of each user’s encryption key pairs and
public key certificates in the database.
• automatically finding and retrieving a recipient’s encryption public key
certificates (see “encryption public key”) when users want to encrypt
for other users
• automatically including the “verification public key certificate” of the
user who signed the file with the signed file
• automatically storing the serial number of revoked certificates (see
“certificate”) in a “Certificate Revocation List (CRL)”
• storing the complete history of a user’s decryption private keys in their
“Entrust digital ID” so that users can continue to access any information
that was encrypted for them.
124
key pair
Asymmetric keys come in pairs. Entrust Managed Services PKI uses
asymmetric keys in both encryption and “digital signature” operations.
key recovery
The process of generating new “activation codes” for a user who has lost
their “security store” or forgotten their password.
key store
A store that holds private keys (see “private key”) for users and machines
and makes them accessible to the “Cryptographic Service Provider (CSP)”
that manages it.
key update
The process that replaces old “key pair” with new ones. During key update,
new public key certificates (see “certificate”) that have no relation to the
old keys and certificates are created and users receive new keys and
certificates securely.
LDAP
Lightweight Directory Access Protocol. A Directory Access Protocol (DAP)
specified by Internet Engineering Task Force (IETF) RFC 1487.
LDAPS
Lightweight Directory Access Protocol Secure. A Directory Access Protocol
used to access a secure LDAP-compliant Directory through a secure port
number. See “Secure Sockets Layer (SSL)”.
machine
See “computer”.
Microsoft
certificate store
A “certificate store” from Microsoft that contains certificates, CRLs (see
“Certificate Revocation List (CRL)”), and Certificate Trust List (CTL) that are
used by “CryptoAPI”-enabled devices such as VPN, Internet
Authentication Service (IAS), domain controllers, and so on.
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Term
Definition
non-repudiation
Irrefutable evidence that makes it impossible to reject the validity of one’s
signature on a file or transaction.
An Entrust “digital signature” provides non-repudiation. It also provides
authentication and data integrity.
non-repudiation
signing key pair
A “key pair” used for users in high-assurance positions who require
separate “digital signature” and non-repudiation keys. It contains a
“non-repudiation signing private key” and a“non-repudiation verification
public key”.
non-repudiation
signing private
key
A “private key” that encrypts a hash value that is decrypted with the
corresponding “non-repudiation verification public key”.
non-repudiation
The “public key” portion of a “non-repudiation signing key pair” used to
verification public “verify” data that has been signed by the corresponding “non-repudiation
signing private key”.
key
organization
A group of people (a company, work group or team, educational or
governmental institution) who all use Entrust software under the same
software license.
PKI
See “Public Key Infrastructure (PKI)”.
PKIX
See “Public Key Infrastructure X.509 (PKIX)”.
PKIX-CMP
protocol
“Public Key Infrastructure X.509 (PKIX)” - Certificate Management
Protocol. The secure communications protocol used to handle requests
between “Security Provider for Windows” and the CA.
policy certificate
A “certificate” that defines privileges for users according to user roles; used
to set user policies.
port 80
The default Web server “HTTP” port.
port 389
The default Directory “LDAP” port.
port 443
The default Web server “HTTPS” port.
port 636
The default Directory “LDAPS” port.
private key
The portion of a “key pair” that is kept secret by its owner.
public key
The portion of a key pair that is available in the “directory”.
Public Key
Cryptographic
Standards (PKCS)
A set of standard protocols that facilitate the exchange of information, in a
secure manner, over the Internet. Refer to
http://www.rsasecurity.com/rsalabs/pkcs/.
Glossary of terms
Report any errors or omissions
125
Term
Definition
Public Key
Cryptography
A cryptographic method that uses keys that are public, for encryption and
verification (see “encrypt” and “verify”), and private, for decryption and
digitally signing data.
Public Key
Infrastructure
(PKI)
1) A system that provides the basis for establishing and maintaining a
trustworthy networking environment through the generation and
distribution of keys and certificates. See “certificate” and “key”.
2) The foundation technology for providing enhanced Internet security.
126
Public Key
Infrastructure
X.509 (PKIX)
A working group within the Internet Engineering Task Force (IETF) that has
developed standards for formatting and transporting information within a
“Public Key Infrastructure (PKI)”.
queuing
The process of lining up auto-enrollment or auto-recovery requests for
approval by an administrator.
recovery
The operation performed on users who have lost or corrupted their
“security store”. It generates a new “signing key pair” and retrieves the
current “encryption public key” certificate, “decryption private key”
history, “verification public key certificate”, and “CA verification public
key” certificate.
reference number
A number obtained from an administrator, which is used along with an
“authorization code” to create a new “certificate”. A reference number can
only be used once.
retrieving users
The process of restoring a user’s “key history” to the database after the user
has been archived.
revoking
certificates
The process of stopping a user from using Entrust. You must revoke a user’s
encryption and verification certificates when the user is no longer trusted
(for example, if you suspect that their “Entrust digital ID” and password
have been compromised by an attacker). You can also revoke certificates
even when there is no suspicion of compromise (for instance, when a user’s
DN changes).
role
Your organization can use roles to allows some people to have
administrative privileges while restricting other users to an end-user role.
root CA
The “Certification Authority (CA)” which is at the top of a hierarchy of two
or more CAs, which acts as a trust anchor for all CAs in the hierarchy.
root certificate
store
The storage medium for the “CA certificate” when Microsoft Active
Directory is not being used.
secure operation
See “sensitive operation”.
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Term
Definition
Secure Sockets
Layer (SSL)
A security protocol that provides communications privacy over the Internet.
The protocol uses a “private key” to encrypt data transferred between
client/server applications. The protocol allows these applications to
communicate in a way that is designed to prevent eavesdropping,
tampering, or message forgery. The protocol also allows Web sites and
users to authenticate one another’s certificates (see “certificate”).
Both Netscape and Microsoft browsers support SSL, and many Web sites
use the protocol to obtain confidential user information, such as credit card
numbers. Typically, Web pages that require SSL use the “HTTPS” protocol.
user
Anyone who uses “Security Provider for Windows”.
Security Provider
for Windows
An Entrust product that delivers enhanced security management and strong
key protection to Microsoft Windows desktop platforms. It is a security
management client for Entrust Managed Services PKI.
security store
The storage medium for a user’s “Entrust digital ID”.
sensitive
operation
1) An administrative operation that requires authentication.
2) Any procedure that requires the use of an end user’s (see “end user”)
“digital ID”. For example, signing or encrypting data. Also known as secure
transaction.
3) Any procedure that transmits sensitive information from the “end user”
to an organization without this information becoming compromised.
serial number
A unique identifier, such as an employee number, that distinguishes a user
in the “directory” from another user with the same name.
server
authentication
The authentication whereby the Web server proves its identity to the user
by enabling a “Secure Sockets Layer (SSL)” connection using a “Web server
certificate”.
Server Login
An Entrust product designed for computers, usually servers, that run Entrust
applications as services or as background applications. These computers,
running 24 hours a day, seven days a week, do not have a user continuously
present and are often in a physically secure area that has restricted access.
See also “credentials file”.
sign
The act of hashing the data to a fixed-size value using a “signing private
key” to create a “digital signature” that provides “non-repudiation”.
signing key pair
The “key pair” that contains a “signing private key” and a “verification
public key”.
Glossary of terms
Report any errors or omissions
127
Term
Definition
signing private
key
The key that encrypts a hash value that is decrypted with the corresponding
“verification public key”. For example, Alice is the only user who has access
to her signing private key, which she uses to encrypt the hash value of a file
she is signing, and users verify the signature by successfully decrypting the
hash value using Alice’s verification public key.
Simple Object
Access Protocol
(SOAP)
Simple Object Access Protocol. A light-weight “XML” protocol that
governs the exchange of information in a distributed environment. SOAP
provides a way for programs running in two different operating systems
(such as Windows 2000 and Solaris) or written in different programming
languages (such as Java and C#) to exchange information, using HTTP and
XML. Refer to http://www.w3.org/2000/xp/Group/.
smart card
An electronic memory card about the size of a credit card used primarily for
storing data. Smart cards can contain an integrated circuit that can make
decisions.
Smart cards can be used to retrieve and store certificates (see “certificate”).
128
SOAP
See “Simple Object Access Protocol (SOAP)”.
SOAP firewall
An application-level firewall that watches for “Simple Object Access
Protocol (SOAP)” messages and transforms these messages as they pass
through the firewall.
SSL
See “Secure Sockets Layer (SSL)”.
subjectAltname
The subjectAltName property provides alternate ways of identifying a user.
symmetric key
A single key that both encrypts and decrypts the same data.
tier
A high-level division of a system (or application), which groups the
components of the system according to their function.
third-party
security store
A storage medium for user’s “Entrust digital ID” that is commonly password
protected, owned by a third-party vendor, and managed by Entrust.
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Term
Definition
third-party trust
A situation in which two people implicitly “trust” each other, even though
they have not previously established a personal relationship. In this
situation, two people can trust each other if they both have a relationship
with a common third party, because the third party can vouch for the
trustworthiness of the two people.
The need for third-party trust is fundamental to any large-scale
implementation of a network security product. “Public Key Cryptography”
requires access to public keys (see “public key”). However, in a large-scale
network, it is impractical and unrealistic to expect each user to have
previously established relationships with all other users. Plus, because public
keys must be widely available, the link between a public key and a person
must be guaranteed by a trusted third party to prevent masquerading. In
effect, users implicitly trust any public key certified by the third party
because their organization owns and securely operates the third-party
certification agent.
TRACE
An Entrust error level that logs trace messages.
Triple-DES
A variation of the “DES” algorithm that uses three 64-bit keys.
trust
A relationship between an “organization” and its end users (see“end
user”), in which both the organization and the end user can rely on the
authenticity of the other to complete sensitive operations, (see “sensitive
operation”) and/or transmit or view sensitive data, such as a protected
resource.
trusted CA store
A repository of trusted digital IDs (see “digital ID”) issued by a non-Entrust
CA to establish “trust” so that non-Entrust users can access data protected
by Entrust software and perform sensitive operations (see “sensitive
operation”) in a cross-certified environment.
.ual file
The “Server Login” “credentials file”, required when you are using Server
Login with an Entrust product.
URL
Uniform Resource Locator. An Internet address that contains the protocol
and “domain”, and optionally the port and path to a resource.
URS profile
A profile created for the Auto-enrollment Server, and used to: verify
signatures, establish SSL connections, sign XAP requests for the XAP Server,
sign files that are used by URS.
User
In a “Public Key Infrastructure (PKI)”, an entity that has been identified and
approved by a “Certification Authority (CA)”. See “end user”.
username
A designated term by which a user identifies him or herself to the system.
It is not necessarily the equivalent of a user’s first name or last name. Also
known as the login name, or user ID.
validity period
See “key lifetime”.
Glossary of terms
Report any errors or omissions
129
Term
Definition
verification public The “public key” portion of a“signing key pair” used to verify data that has
been signed by the corresponding“signing private key” and is stored in the
key
“verification public key certificate”.
verification public The certificate that verifies that the“verification public key” within it is the
authentic public key of the identified user through its “digital signature”,
key certificate
which is signed by the “Certification Authority (CA)”.
verify
The act of providing an auditable record of a transaction, usually in the form
of a “digital signature”, that binds each party to a transaction such they
cannot repudiate participating in it. See “non-repudiation”.
WARNING
An Entrust error level that logs recoverable errors that in normal situations
do not occur, such as application warning messages.
Web server
certificate
A “certificate” issued to a Web server that enables “Secure Sockets Layer
(SSL)” and contains the “digital signature” of the “Certification Authority
(CA)” that issued it.
Web server SSL
Secure communication over “HTTPS” between the Web server and the
Web browser
Web service
A program that runs within an application server that communicates to
other requesting components using the “Simple Object Access Protocol
(SOAP)”. Web services have two advantages:
• The SOAP protocol provides a standard way for the Web service and its
clients to encode and decode (or "parse") the object code so that
programmers don't have to write their own. The standard also means
that programs written by different companies can communicate with
the Web service.
• SOAP envelopes are typically sent within “HTTP” requests so you do
not have to open additional ports in your firewall for clients to
communicate with the Web service
X.509 certificate
A standard that ensures interoperability between systems that use digital
certificates. See “certificate”.
XAP
XML Administration Protocol
XML
eXtensible Markup Language. A W3C specification for structured data.
Refer to http://www.w3.org/TR/2000/REC-xml-20001006.
Similar to HTML, XML uses tags and attributes to place structured data into
text files. XML is different from HTML in that it is a meta-language and,
therefore, does not define specific tags and attributes; it just tells you how
to define those tags and attributes.
130
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
A
Writing your own DN Builder
implementation code
This appendix provides information to help you write your own DN Builder
implementation code.
•
“DN Builder examples” on page 132
•
“Customizing the DN builder code” on page 133
•
“DistinguishedNameBuilderDefaultImp” on page 135
•
“ActiveDirectoryUserInfo” on page 149
131
DN Builder examples
Auto-enrollment Server installs two DN Builder implementation examples into the
following location on your system:
<install_directory>\AutoEnrollmentServices\examples\source\com\
entrust\adminservices\urs\autoenroll
where <install_directory> is the installation location of Auto-enrollment Server.
By default, the install location is C:\Program Files\Entrust.
Read through the following two examples to become familiar with their code:
132
•
DistinguishedNameBuilderCustomNames.java — this sample DN
Builder implementation sets a surname, instead of the Windows domain
name that is set with the default
DistinguishedNameBuilderDefaultImpl.
•
DistinguishedNameBuilderSubjectAltName.java — this sample DN
Builder implementation sets an email address and UPN into the
subjectAltName extension in the user’s certificate, which the
Auto-enrollment Server creates for the client. This implementation cannot be
used for computer certificates.
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Customizing the DN builder code
When you do not want to use the default DistinguishedNameBuilderImpl
behavior and Active Directory is not the certificate repository, you can write your own
DN builder implementation code.
To use your own DN builder code
1
Write your own DN builder logic. Always subclass the default
DistinguishedNameBuilderImpl implementation.
Refer to the “DN Builder examples” on page 132 and “Customizing the default
DN Builder implementation” on page 135.
2
Compile your java class. You will need the following two .jar files in your class
path:
“<install
directory>\AutoEnrollmentServices\deploy\AdminServicesApp\WE
B-INF\lib\entrust-urs.jar
“<install
directory>\AutoEnrollmentServices\deploy\AdminServicesApp\WE
B-INF\lib\entrust-webapp.jar
3
Place the resulting .class file under the classes folder.
<install
directory>\AutoEnrollmentServices\deploy\AdminServicesApp\WE
B-INF\classes\
Note: If your class is not in the root package, put it into a folder under the classes
folder.
4
Locate the following section of code in the ae-defaults.xml file:
<!-- The DistinguishedNameBuilder implementation. Edit this
if you provide your own implementation class. -->
<DNBuilder>DistinguishedNameBuilderDefaultImpl</DNBuilder>
5
Edit the <DNBuilder> value with the name of the java class you just created. For
example, if your new java class name is “DNBuilderMyCustomClass.class”
your ae-defaults.xml file will look like this:
<DNBuilder>DNBuilderMyCustomClass</DNBuilder>
This example assumes that your class is in the root package.
6
Restart the Auto-enrollment Server service in Windows Services.
7
When you have manually restarted the Auto-enrollment Server service, the
adminservices.log file should display the following event:
Writing your own DN Builder implementation code
Report any errors or omissions
133
[2005-05-05
12:38:08-0400][TRACE][UserRegistrationService][][][] AE
Server - DN builder: DNBuilderMyCustomClass
134
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
DistinguishedNameBuilderDefaultImp
The public class DistinguishedNameBuilderDefaultImpl implements
DistinguishedNameBuilder. The following sections provide you with all of the
information needed to customize your own DN Builder implementation:
•
“Customizing the default DN Builder implementation” on page 135
•
“Constructor Summary” on page 136
•
“Method Summary” on page 136
•
“Constructor Detail” on page 139
•
“Method Detail” on page 139
Refer to the section “Customizing a user’s Distinguished Name (DN)” on page 97 for
further information on the default DN builder implementation.
Customizing the default DN Builder implementation
Subclass the default DistinguishedNameBuilderDefaultImpl and override one
or more of its methods. The Auto-enrollment Server invokes the methods in this
order:
First, it sets aside static data;
1
The constructor sets the CA search base.
2
setSearchBases(.)
3
setActiveDirectory(.)
4
setUserType(.)
On every client request, the Auto-enrollment Server provides the following
information to the DN Builder:
•
setDomainAndName(.)
•
setMachineCertificate(.)
•
setClientAgent(.)
•
setClientDigitalIDType(.)
•
setAdditionalInfo(.)
•
setActiveDirectoryUserInfo(.)
To access this information, your DN Builder implementation can use the accessor
methods in the DistinguishedNameBuilderDefaultImpl, its super class.
5
To change the default behavior, you may create a DN, common name, and
surname by overriding the following:
buildClientDN()
Writing your own DN Builder implementation code
Report any errors or omissions
135
Your implementation should provide a surname, unless you are using Active
Directory, because the PKI makes that mandatory for user type “Person”.
6
Optionally, create different SubjectAltName extensions by overriding the
following:
buildSubjectAltName();
The server will retrieve the contents of your DN Builder by invoking the following
methods:
•
getDistinguishedName()
•
getCommonName()
•
getSurname()
•
getSubjectAltName()
Your implementation overrides the above methods, returning the strings that it
builds in its buildClientDN() and buildSubjectAltName() implementations, if any.
7
Optionally, your implementation may override the following:
•
getSerialNumber()
Your subclass might use the following helper method to provide the dNS name
of the client computer:
•
String getDNSName (String windowsdomain)
Constructor Summary
DistinguishedNameBuilderDefaultImpl ()
Method Summary
Table 4: Class DistinguishedNameBuilderImpl Method Summary
Method Summary
void
buildClientDN ()
Implements a procedure for building the distinguished name.
void
buildSubjectAltName ()
Implements a procedure for building a SubjectAltName.
ActiveDirectoryUserInfo
getActiveDirectoryUserInfo ()
Convenience method that accesses any client information that
the Auto-enrollment Server may have set into the
DistinguishedNameBuilder, when Active Directory is being used.
136
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Table 4: Class DistinguishedNameBuilderImpl Method Summary
Method Summary
java.lang.String []
getAdditionaInfo ()
Gets the AdditonaInfo the client sent in its SOAP request, if any.
java.lang.String
getClientAgent ()
Gets the client agent the client sent in its SOAP request, if any.
int
getClientDigitalIDType ()
Gets the client digital ID the client sent in its SOAP request, if
any.
java.lang.String
getCommonName ()
Gets the common name this implementation has built.
java.lang.String
getDistinguishedName ()
Gets the distinguished name this implementation has built.
java.lang.String
getDNSNAME (DomainAndName domainAndName)
Helper method that returns the DNS name of the client
computer.
DomainAndName
getDomainAndName ()
Gets the Windows domain and name of the client.
java.lang.String
getNameCA ()
Get the CA name this implementation can use when building a
DN.
SearchBases
getSearchBases ()
Gets the search bases this implementation can use when
building a DN.
java.lang.String
getSerialNumber ()
Gets the serial number.
java.lang.String []
getSubjectAltName ()
Gets any SubjectAltName strings that were built by the DN
builder implementation.
java.lang.String
getSurname ()
Gets the surname this implementation has built.
java.lang.String
getUserType ()
Returns the default user type in effect.
Writing your own DN Builder implementation code
Report any errors or omissions
137
Table 4: Class DistinguishedNameBuilderImpl Method Summary
Method Summary
boolean
isActiveDirectory ()
Returns true if the ae-defaults.xml configuration says that
Active Directory is being used as the certificate repository.
boolean
isMachineCertificate ()
Returns true if theclient has requested enrollment of a computer,
not a user.
void
setActiveDirectory (boolean activedirectory)
Invoked by the server when activedirectory is set to true, if the
ae-defaults.xml configuration says that Active Directory is being
used as the certificate repository.
void
setActiveDirectoryUserInfo (ActiveDirectoryUserInfo userinfo)
Invoked by the server when the Auto-enrollment Server
configuration indicates that Active Directory is being used.
void
setAdditionaInfo (java.lang.String [] additionaInfo)
Save additional information the client might have sent in its
request, if any.
void
setClientAgent (java.lang.String clientAgent)
Sets whatever client agent string the client might have sent in its
request, if any.
void
setClientDigitalIDType (int clientType)
Sets the type of client digital ID that the client reported in its
SOAP request message, if any.
void
setCommonName (java.lang.String cn)
Sets the common name this implementation will use.
void
setDomainAndName (DomainAndName domainAndName)
Sets the Windows domain and name of the client
void
setMachineCertificate (boolean isMachine)
Invoked by the server with ‘isMachine’ set to true, if the client
has requested enrollment of a computer, not a user.
void
setNameCA (java.lang.String dn)
Sets the name of the CA.
138
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Table 4: Class DistinguishedNameBuilderImpl Method Summary
Method Summary
void
setSearchBases (SearchBases searchbases)
Sets the search bases to use when building the DN.
void
setSubjectAltName (java.lang.String [] subjectAltName)
Sets the SubjectAltName this implementation will use.
void
setSurname (java.lang.String surname)
Sets the surname this implementation will use.
void
setUserType (java.lang.String userType)
Sets the default user type.
Constructor Detail
DistinguishedNameBuilderDefaultImpl
public DistinguishedNameBuilderDefaultImpl ()
Method Detail
setMachineCertificate
public void setMachineCertificate (boolean isMachine)
Invoked by the server with ‘isMachine’ set to true, if the client has requested
enrollment of a computer not a user. The DistinguishedNameBuilder implementation
might use this information or ignore it, when it builds a SubjectAltName or a DN.
Specified by:
setMachineCertificate in interface DistinguishedNameBuilder
Parameters:
isMachine — set to true if the enrollment is for machine certificate, not a user
certificate.
setActiveDirectory
public void setActiveDirectory (boolean activedirectory)
Invoked by the server with activedirectory set to true, if the ae-defaults.xml
configuration says that Active Directory is being used as the certificate repository.
Writing your own DN Builder implementation code
Report any errors or omissions
139
A customized DistinguishedNameBuilder implementation might use this information
when it builds a SubjectAltName or a DN.
Specified by:
setActiveDirectory in interface DistinguishedNameBuilder
Parameters:
activedirectory — is strue if using Active Directory as the certificate repository.
isActiveDirectory
public boolean isActiveDirectory ()
Returns true if the ae-defaults.xml configuration says that Active Directory is
being used as the certificate repository.
A customized DistinguishedNameBuilder implementation might use this information
when it builds a SubjectAltName or a DN.
Specified by:
isActiveDirectory in interface DistinguishedNameBuilder
Returns:
true if using an Active Directory certificate repository.
setDomainAndName
public void setDomainAndName (DomainAndName domainAndName)
throws DistinguishedNameBuilderException
Sets the Windows domain and name of the client. Invoked by the server to provide
a DistinguishedNameBuilder implementation with the domain and name of the user
making the request.
Specified by:
setDomainAndName in interface DistinguishedNameBuilder
Parameters:
domainAndName — the DomainAndName
Throws:
DistinguishedNameBuilderException
getActiveDirectoryUserInfo
public ActiveDirectoryUserInfo getActiveDirectoryUserInfo ()
Convenience method that accesses any client information the Auto-enrollment
Server may have set into this DistinguishedNameBuilder, when ActiveDirectory is
140
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
being used. Your customized DistinguishedNameBuilder implementation might use
this information to build the DN or SubjectAltName.
Refer to the “ActiveDirectoryUserInfo” on page 149 for its content.
Note: This method is provided only for the convenience of the implementations
that subclass DistinguishedNameBuilderDefaultImpl. The Auto-enrollment Server
doesn’t invoke this by default.
Specified by:
getActiveDirectoryUserInfo in interface DistinguishedNameBuilder
Returns:
the ActiveDirectoryUserInfo or null
See also:
isActiveDirectory
buildClientDN
public void buildClientDN ()
throws DistinguishedNameBuilderException
Implements a procedure for building the distinguished name. Invoked by the
Auto-enrollment server before it invokes getDistinguishedName(),
getCommonName(), and getSurname().
Default implementation sets the common name to be the user or machine name and
the surname to be the domain.
The client is enrolled on the search base set in the Auto-enrollment Server’s
ae-config.xml, or the CA search base if the configuration did not provide it.
If your Auto-enrollment Server is using an Active Directory, this method uses the
information provided by the Directory to get the distinguished name of the user. You
must configure the ae-defaults.xml settings so the server can access the directory.
Specified by:
buildClientDN in interface DistinguishedNameBuilder
Throws:
DistinguishedNameBuilderException
buildSubjectAltName
public void buildSubjectAltName ()
throws DistinguishedNameBuilderException
Writing your own DN Builder implementation code
Report any errors or omissions
141
Implements a procedure for building a SubjectAltName. This default implementation
sets a DNS name for all computer enrollments. In addition, it sets a GUID as an
otherName, if the client requested a domain controller certificate. The result is
retrieved by getSubjectAltName().
If the Auto-enrollment Server is using an Active Directory, this method reads the
Directory to get the email address and userPrincipalName, if any, so they can be set
as SubjectAltName extensions.
Specified by:
buildSubjectAltName in interface DistinguishedNameBuilder
Throws:
DistinguishedNameBuilderException
getNameCA
public java.lang.String getNameCA ()
Get the CA name this implementation can use when building a DN.
Specified by:
getNameCA in interface DistinguishedNameBuilder
Returns:
the distinguished name of the issuer of the verification certificate of Auto-enrollment
Server administrator (URS admin)
setNameCA
public void setNameCA (java.lang.String dn)
Sets the name of the CA.
Specified by:
setNameCA in interface DistinguishedNameBuilder
Parameters:
dn — the name of the CA
setSearchBases
public void setSearchBases (SearchBases searchbases)
Sets the search bases to use when building the DN. Invoked by the Auto-enrollment
Server, if the Auto-enrollment Server configuration provides a search base in its
configuration parameters.
Specified by:
setSearchBases in interface DistinguishedNameBuilder
142
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Parameters:
searchbases — the searchbases for users and computers
getSearchBases
public SearchBases getSearchBases ()
Gets the search bases this implementation can use when building a DN. Search bases
for user and machine enrollments can be configured in the ae-defaults.xml file.
setAdditionaInfo
public void setAdditionaInfo (java.lang.String [] additionaInfo)
Save additional information the client might have sent in its request, if any. Invoked
by the Auto-enrollment Server, to provide this information to a
DistinguishedNameBuilder.
Specified by:
setAdditionaInfo in interface DistinguishedNameBuilder
Parameters:
additionaInfo — the AdditionaInfo strings which were in the client SOAP request
message, if any.
getAdditionaInfo
public java.lang.String [] getAdditionaInfo ()
Gets the AdditionaInfo the client sent in its SOAP request, if any.
setClientAgent
public void setClientAgent (java.lang.String clientAgent)
Sets whatever client agent string the client might have sent in its request, if any.
Invoked by the Auto-enrollment Server, to provide this information to a
DistinguishedNameBuilder.
Specified by:
setClientAgent in interface DistinguishedNameBuilder
Parameters:
clientAgent — the string received in the client SOAP request message, if any.
getClientAgent
public java.lang.String getClientAgent ()
Writing your own DN Builder implementation code
Report any errors or omissions
143
Gets the client agent the client sent in its SOAP request, if any.
setClientDigitalIDType
public void setClientDigitalIDType (int clientType)
throws DistinguishedNameBuilderException
Sets the type of client digital ID that the client reported in its SOAP request message,
if any. Invoked by the Auto-enrollment Server, to provide this information to a
DistinguishedNameBuilder. The allowed values are enumerated in
AutoEnrollConstants.
Specified by:
setClientDigitalIDType in interface DistinguishedNameBuilder
Parameters:
clientType — the value received in the client SOAP request message, if any.
Throws:
DistinguishedNameBuilderException
getClientDigitalIDType
public int getClientDigitalIDType ()
Gets the client digital ID the client sent in its SOAP request, if any. The allowed values
are enumerated in AutoEnrollConstants.
getSerialNumber
public java.lang.String getSerialNumber ()
Gets the serial number. This default implementation returns null.
Specified by:
getSerialNumber in interface DistinguishedNameBuilder
Returns:
the serial number
isMachineCertificate
public boolean isMachineCertificate ()
Returns true if the client has requested enrollment of a computer, not a user. A
customized DistinguishedNameBuilder implementation might use this information
when it builds a SubjectAltName or a DN.
Specified by:
144
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
isMachineCertificate in interface DistinguishedNameBuilder
getDomainAndName
public DomainAndName getDomainAndName ()
Gets the Windows domain and name of the client.
Specified by:
getDomainAndName in interface DistinguishedNameBuilder
Returns:
the DomainAndName that the Auto-enrollment Server set into this instance, or null.
getDistinguishedName
public java.lang.String getDistinguishedName ()
Gets the distinguished name this implementation has built.
Specified by:
getDistinguishedName in interface DistinguishedNameBuilder
Returns:
the distinguished name
getCommonName
public java.lang.String getCommonName ()
Gets the common name this implementation has built. This default implementation
sets the common name to be the client’s Windows logon name.
Specified by:
getCommonName in interface DistinguishedNameBuilder
Returns:
the common name
setCommonName
public void setCommonName (java.lang.String cn)
Sets the common name this implementation will use.
The Auto-enrollment Server does not invoke this method, but your customized
subclass might invoke it. Otherwise, this default implementation sets the common to
be the client’s Windows user name.
Specified by:
Writing your own DN Builder implementation code
Report any errors or omissions
145
setCommonName in interface DistinguishedNameBuilder
Parameters:
cn — the common name
getSurname
public java.lang.String getSurname ()
Gets the surname this implementation has built. This default implementation sets the
surname to be the client’s Windows domain.
Note: Unless you are using Active Directory, your implementation should
provide a surname, because it is mandatory for the user type “Person”.
Specified by:
getSurname in interface DistinguishedNameBuilder
Returns:
the surname
setSurname
public void setSurname (java.lang.String surname)
Sets the surname this implementation will use. The Auto-enrollment Server does not
invoke this method itself, but your customized subclass might invoke it. Otherwise,
this default implementation sets the surname to be the client’s WIndows domain.
Specified by:
setSurname in interface DistinguishedNameBuilder
Parameters:
surname — the surname
getSubjectAltName
public java.lang.String [] getSubjectAltName ()
Get any SubjectAltName strings that were built by the DN builder implementation.
Specified by:
getSubjectAltName in interface DistinguishedNameBuilder
Returns:
subjectAltName — the SubjectAltName
146
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
getUserType
public java.lang.String getUserType ()
Returns the default user type in effect. For example:
•
Person
•
Domain User
A customized DistinguishedNameBuilder implementation may use this information to
build a DN. For example, a Person must be given a surname, while a Domain User
must not.
Specified by:
getUserType in interface DistinguishedNameBuilder
Returns:
the default user type
setActiveDirectoryUserInfo
public void setActiveDirectoryUserInfo (ActiveDirectoryUserInfo
userinfo)
Invoked by the Auto-enrollment Server when the ae-config.xml indicates that
Active Directory is being used. A customized DistinguishedNameBuilder
implementation might use this information when it sets a SubjectAltName or a DN.
This default implementation gets the DN, email address, and UPN from this
ActiveDirectoryUserInfo. ‘
Specified by:
setActiveDirectoryUserInfo in interface DistinguishedNameBuilder
Parameters:
userinfo — has the ActiveDirectoryUserInfo that the server reads from the Active
Directory
getDNSName
public java.lang.String getDNSName (DomainAndName domainAndName)
throws DistinguishedNameBuilderException
Helper method that returns the DNS name of a client computer. The enrollment
request must have come from a computer, not a user.
First, this method performs a DNS look up, to get the client host name given its IP
address. If that fails, it refers to the mapping that you configure in the
ae-defaults.xml file. For example, you may map ACME_HQ to acme.com, so a
machine named webserver would get the DNS name webserver.acme.com from this
method.
Writing your own DN Builder implementation code
Report any errors or omissions
147
If there is no mapping in ae-defaults.xml, this method throws an exception.
Specified by:
getDNSName in interface DistinguishedNameBuilder
Returns:
the DNS name
Throws:
DistinguishedNameBuilderException — if a DNS name cannot be returned
148
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
ActiveDirectoryUserInfo
The public final class ActiveDirectoryUserInfo contains client information that
Auto-enrollment Server may read from a Microsoft Active Directory. The following
sections provide you with information needed to understand what client information
may be read from an Active Directory.
•
“Method Summary” on page 149
•
“Method Detail” on page 149
Method Summary
Table 5: Class ActiveDirectoryUserInfo Method Summary
Method summary
java.lang.String
getCommonName ()
Returns the common name.
java.lang.String
getDistinguishedName ()
Returns the distinguished name.
java.lang.String
getEmail ()
Returns email.
java.lang.String
getFirstName ()
Returns the first name.
java.lang.String
getSurname ()
Returns the surname.
java.lang.String
getUPN ()
Returns the upn.
java.lang.String
getWindowsAccountName ()
Returns the Windows logon name.
Method Detail
getCommonName
public java.lang.String getCommonName ()
Returns the common name.
Writing your own DN Builder implementation code
Report any errors or omissions
149
Returns:
String
getDistinguishedName
public java.lang.String getDistinguishedName ()
Returns the distinguished name.
Returns:
String
getEmail
public java.lang.String getEmail ()
Returns the email.
Returns:
String
getFirstName
public java.lang.String getFirstName ()
Returns the first name.
Returns:
String
getSurname
public java.lang.String getSurname ()
Returns the surname.
Returns:
String
getUPN
public java.lang.String getUPN ()
Returns the upn.
Returns:
String
150
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
getWindowsAccountName
public java.lang.String getWindowsAccountName ()
Returns the Windows logon name.
Returns:
String
Writing your own DN Builder implementation code
Report any errors or omissions
151
152
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 1.0
Report any errors or omissions
Index
-
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
.epf file
definition 122
.ual file
definition 129
A
About Auto-enrollment Server 7
activation codes
definition 117
active user
definition 117
ActiveDirectoryUserInfo class 149
added user
definition 117
administrator
definition 117
ae-config.xml 89
ae-defaults.xml 89
ALERT
definition 117
algorithm
DES
definition 121
Triple-DES
definition 129
attribute
definition 117
authentication
definition 118
authorization code
definition 118
authorize
definition 118
C
CA
certificate
definition 118
root
-
definition 126
signing key pair
definition 118
signing private key
definition 118
verification public key
definition 118
CA issuer
definition 118
cache
definition 118
CAPI
definition 118
certificate
certificate category
definition 119
certificate type
definition 119
definition 119
validation
definition 119
Web server certificate
definition 130
X.509 certificate
definition 130
certificate expiry
definition 119
certificate revocation
see certificate 119
Certificate Revocation List (CRL)
definition 119
certificate store
definition 119
Microsoft
definition 124
root
definition 126
certificate type and role 13
certificates
revocation
definition 126
Certification Authority (CA)
153
-
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
definition 119
client
definition 119
client authentication
definition 120
client information setting 93
computer
definition 120
credentials
credentials file
definition 120
definition 120
CRL check
definition 120
CryptoAPI
definition 120
Cryptographic Service Provider (CSP)
definition 120
CSP type
definition 120
D
Database 12
database
definition 120
deactivate
definition 121
DEBUG
definition 121
decrypt
definition 121
decryption private key
definition 121
desktop user
definition 121
digital ID
definition 121
digital signature
definition 121
Directory 12
directory
definition 121
Distinguished Name (DN)
customizing 97
definition 121
DistinguishedNameBuilderDefaultImpl class 135
DistinguishedNameBuilderImpl 97
154
DN builder implementation 16
DNBuilderSearchBase 98
dNS name
configuring 99
domain
see CA domain 121
E
encrypt
definition 122
encryption key pair
definition 122
encryption public key
definition 122
end user
definition 122
enrollment
definition 122
Entrust Authority™ Security Manager 11
Entrust certificate file
definition 122
Entrust desktop security store
definition 122
Entrust digital ID
definition 122
Entrust Entelligence™ Security Provider for Windows 10
Entrust roaming security store
definition 122
Entrust security store
definition 122
entrust.ini file
definition 122
ERROR
definition 122
error messages 116
F
FATAL
definition 123
File Structure 86
G
Globally Unique Identifier (GUID)
definition 123
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 4.0
-
-
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
H
L
Hardware Security Module (HSM)
definition 123
HTTP
definition 123
HTTPS
definition 123
LDAP
definition 124
LDAPS
definition 124
logging 110
log file location 111
log level 110
maximum log file size 112
maximum message length 114
number of backup log files allowed 113
I
INFO
definition 123
Installation
planning 20
Installing
Auto-enrollment Server 74
checking 86
Internet Information Server (IIS)
definition 123
J
Java Virtual Machine (JVM)
definition 123
K
key
definition 123
key backup
definition 123
key history
definition 123
key lifetime
definition 123
key pair
definition 124
key recovery
definition 124
key store
definition 124
key update
definition 124
management
definition 124
key store
definition 124
-
M
machine
definition 124
Microsoft Internet Information Services (IIS) Web Serve 11
N
non-repudiation
definition 125
signing key pair
definition 125
signing private key
definition 125
verification public key
definition 125
non-repudiation signing key pair
definition 125
non-repudiation signing private key
definition 125
non-repudiation verification public key
definition 125
O
organization
definition 125
P
PKIX-CMP protocol
definition 125
policy certificate
definition 125
Index
155
-
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
port
389
definition 125
443
definition 125
636
definition 125
80
definition 125
private key
decryption
definition 121
definition 125
signing
definition 128
public key
definition 125
Public Key Cryptography
definition 126
Public Key Infrastructure (PKI)
definition 126
Public Key Infrastructure X.509 (PKIX)
definition 126
Q
queuing 101
definition 126
enabling in Auto-enrollment Server 102
R
recovery
definition 126
reference number
definition 126
retrieving users
definition 126
role
definition 126
S
search base
customizing 98
DNBuilderSearchBase 98
Secure Sockets Layer (SSL)
definition 127
156
Security Provider
definition 127
Security Provider for Outlook
Overview 8
Security Provider for Windows 10
AutoEnrollMachineDigitalIDType 93
AutoEnrollMachineURL 10
AutoEnrollUserDigitalIDType 93
AutoEnrollUserURL 10
security store
definition 127
Entrust security store
definition 122
sensitive operation
definition 127
serial number
definition 127
server authentication
definition 127
Server Login
definition 127
sign
definition 127
signing key pair
definition 127
signing private key
definition 128
Simple Object Access Protocol (SOAP)
definition 128
smart card
definition 128
SOAP
SOAP firewall
definition 128
subjectAltname
definition 128
subjectAltName creation 17
domain controller certificates 17
symmetric key
definition 128
system components 9
T
third-party security store
definition 128
third-party trust
definition 129
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 4.0
-
-
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Three-Tier client/server environment 9
tier
definition 128
Tier 1 10
Tier 2 10
Tier 3 11
time synchronization 115
Tomcat Application Server 11
TRACE
definition 129
trust
definition 129
trusted CA store
definition 129
-
creating and installing certificate 24
enabling SSL 51
Web server SSL
definition 130
Web service
definition 130
X
XAP
definition 130
XML
definition 130
U
URL
definition 129
URS profile
creating 61
definition 129
User
definition 129
user
deactivated
definition 121
definition 127
username
definition 129
V
validity period
see key lifetime 129
verification public key
definition 130
verification public key certificate
definition 130
verify
definition 130
W
WARNING
definition 130
Web Server
Index
157
-
158
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Auto-enrollment Server 7.0 Installation and Configuration Guide
Document issue: 4.0
-