Complete Contents
About This Guide
PART 1: Netscape Certificate Management System
Chapter 1: Introduction to Certificate Management System
Chapter 2: Administration Tasks and Tool
Chapter 3: Configuration
PART 2: Managing Certificate Management System
Chapter 4: Installing and Uninstalling Instances
Chapter 5: Starting and Stopping Instances
PART 3: System-Level Configuration
Chapter 6: Configuring Ports, Database, and SMTP Settings
Chapter 7: Managing Privileged Users and Groups
Chapter 8: Keys and Certificates
PART 4: Authentication
Chapter 9: Introduction to Authentication
Chapter 10: Using the PIN Generator Tool
Chapter 11: Configuring Authentication for End Entities
Chapter 12: Developing Authentication Plug-ins
PART 5: Job Scheduling and Notification
Chapter 13: Introduction to Job Scheduling and Notifications
Chapter 14: Configuring Jobs
PART 6: Policies
Chapter 15: Introduction to Policies
Chapter 16: Configuring Policies
PART 7: LDAP Publishing
Chapter 17: Introduction to LDAP Publishing
Chapter 18: Configuring Subsystems for LDAP Publishing
Chapter 19: Publishing CRLs
PART 8: Agent and End-Entity Interfaces
Chapter 20: Introduction to End-Entity and Agent Interfaces
Chapter 21: Customizing End-Entity and Agent Interfaces
PART 9: Logs
Chapter 22: Introduction to Logs
Chapter 23: Managing Logs
PART 10: Issuance and Management of End-Entity Certificates
Chapter 24: Issuing and Managing End-Entity Certificates
Chapter 25: Recovering Encrypted Data
PART 11: Appendixes
Appendix A: Distinguished Names
Appendix B: Backing Up and Restoring Data
Appendix C: Command-Line Utilities
Appendix D: Certificate Database Tool
Appendix E: Key Database Tool
Appendix F: Netscape Signing Tool
Appendix G: SSL Strength Tool
Appendix H: SSL Debugging Tool
Previous Next Contents Index Bookshelf


Chapter 1 Introduction to Certificate Management System

This chapter introduces Netscape Certificate Management System (CMS), a highly configurable set of software components and tools for creating, deploying, and managing certificates. Based on open standards for certificate management, Certificate Management System leverages Netscape Directory Server and Netscape Console to provide a complete, scalable, high-performance certificate management solution for extranets and intranets.

Whether you are looking for a security solution for your enterprise or setting up an independent certificate authority (CA) service, Certificate Management System offers a robust, customizable, and scalable foundation for your public-key infrastructure (PKI).

The chapter has the following sections:


Overview
Certificate Management System provides a highly scalable, easily deployable certificate infrastructure for supporting encryption, authentication, tamper detection, and digital signatures in networked communications. It is based on open standards and protocols such as Public-Key Cryptography Standard (PKCS) #7, 10, 11, and 12, Secure Sockets Layer (SSL), Lightweight Directory Access Protocol (LDAP), and the X.509 certificate formats recommended by the International Telecommunications Union (ITU). Certificate Management System is highly customizable and configurable, permitting rapid integration with existing client and server software, customer databases, security systems, and authentication procedures.

You can use Certificate Management System to set up and manage your own public-key infrastructure or to deploy a public certification authority. Certificate Management System meets the needs of an enterprise, leveraging your existing enterprise resources and services, and will grow with your business needs to meet the demand of Internet-scale deployments.

With Certificate Management System, you can do the following operations:


Key Features
Certificate Management System has many core features:

Support for open standards

With its support for open standards, Certificate Management System gives organizations confidence that they will be able to communicate within a heterogeneous computing environment. Specifically, Certificate Management System does the following:

Separate subsystems for certificate and key operations

Certificate Management System includes three servers, the Certificate Manager, Registration Manager, and Data Recovery Manager.

Single CA supports multiple registration authorities

Certificate Management System lets you separate the registration process from the certificate-signing process with the help of Registration Managers. You can run multiple Registration Managers remotely, all reporting to a single CA--a Certificate Manager--to verify user identities and process certificate signing requests. The remote Registration Managers forward their completed and approved requests to the Certificate Manager for it to sign and issue the certificate automatically.

The certificate requests submitted by the remote Registration Managers are standards-based, so that you can integrate your own registration process into the certificate management process.

The Certificate Manager's ability to support multiple Registration Managers makes it more scalable and also adds an extra layer of security for the CA. For example, you can set a policy that requires all clients to go through a remote Registration Manager, and then have the remote Registration Manager route all client requests to the Certificate Manager located inside a firewall.

Ability to function as both a root and a subordinate CA in a CA hierarchy

Certificate Management System can function as a root (or parent) CA (in which case the server signs its own CA signing key as well as other CA signing keys) enabling you to create your own CA hierarchy. You can also install the server to function as a subordinate CA (in which case the server gets its CA signing key signed by another CA) in an existing CA hierarchy.

Ability to function as a linked CA

Certificate Management System can function as a linked CA, chaining up to many third-party or public CAs for validation; this provides cross-company trust, so applications can verify certificate chains outside the company certificate hierarchy.

PKCS #11 hardware support for smart cards and crypto accelerators

Certificate Management System supports smart cards and crypto accelerators provided by various third-party vendors of PKCS #11 version 2.1-compliant products. For a complete list of vendors, see the information available at this URL: http://home.netscape.com/cms/v4.0/index.html

You can configure the server to use different PKCS #11 modules to generate and store key pairs (and certificates) for the Certificate Manager, Registration Manager, and Data Recovery Manager. Using hardware for key storage (especially for Certificate Manager and Data Recovery Manager key pairs) reduces the risk of key compromise, because hardware tokens don't reveal keys or provide means for them to be revealed, once the keys are generated in the hardware.

Support for Netscape client and server products; client independence for non-Netscape products

Certificates issued by Certificate Management System work with existing Netscape client and server products that support SSL. The certificates also work (out of the box) with a variety of non-Netscape, standards-compliant applications. For a complete list of these products, see the information available at this URL: http://home.netscape.com/cms/v4.0/index.html

Highly scalable certificate data store

Certificate Management System uses a highly scalable, high-performance certificate storage facility--a built-in, preconfigured version of Netscape Directory Server 4.x--enabling you to issue and manage a large number of certificates.

Flexible end-entity registration services framework

The registration services framework for end entities includes the most commonly expected PKI features: manual, directory-based, and directory- plus PIN-based enrollment; certificate-authenticated renewals and revocations (based on SSL client authentication); certificate life-cycle operations that include automated certificate renewal and expiration notifications. These features are available out of the box for both Certificate Manager and Registration Manager.

Built-in plug-in modules for authentication, policy, job scheduling, and LDAP publishing

Certificate Management System simplifies the details involved in certificate issuance and management with its built-in, configurable, and extensible authentication, policy, job scheduling, and LDAP publishing components. Each of these components come with customizable plug-in modules. For example, you can configure policy modules to determine the outcome of operations, such as certificate formulation (extensions, signing algorithm, key length, validity period, and so on), issuance, renewal, and revocation.

Single administration point achieved via LDAP-compliant directory integration

Certificate Management System works seamlessly with any LDAP-compliant directory services for easy distribution of certificates and CRLs, thus lowering the cost of information management. The shared directory architecture enables you to manage users, including their security credentials and other shared data, at a single place. Certificate Management System can do the following:

Supports certificate generation for dual key pairs--separate key pairs for signing and encrypting mail messages

To support separate key pairs for signing and encrypting data, Certificate Management System supports generation of dual certificates for end entities capable of generating dual key pairs. If a client makes a certificate request for dual key pairs, the server issues two separate certificates.

Key archival and recovery for encryption private keys

If your organization uses S/MIME to encrypt mail messages, you can use the key archival feature offered by Certificate Management System to back up users' encryption private keys. This feature is useful when a key becomes unavailable--as, for instance, in the following cases:

Encrypted key storage and password-protected recovery

Certificate Management System stores users' encryption private keys in an encrypted key repository. Keys can be retrieved only by authorized key recovery agents. The key repository is encrypted using a Data Recovery Manager's storage private key, which is protected with one or more recovery agents' passwords. Only these designated recovery agents can authorize and initiate a key recovery process.

Extensive audit and log records for detection of tampering

Certificate Management System maintains audit trails for all events--certificate requests and issuance, revocation requests, CRL publication, and so on. These audit records enable you to detect any unauthorized access or activity. In addition, extensive system and error logs record various events and system errors so that you can monitor and debug the system. All log records are stored in your local file system for quick and easy retrieval.

Supports signing of log files for tamper detection

Certificate Management System allows you to sign log files digitally before archiving them or distributing them for audit purposes. This feature enables you to check whether the log files were tampered with after being signed.

Java SDK extension mechanism for customization

The Java-based software development kit (SDK) provided with Certificate Management System includes APIs for customizing different aspects of the system. You can write the following custom modules:

Easy migration path from Netscape Certificate Server 1.0x

Certificate Management System provides an easy migration path from Netscape Certificate Server 1.0x. The server includes a command-line-based migration tool that extracts the contents of a Certificate Server 1.0x database, including keys and certificates, and puts them in three platform-independent files. You then import the contents of these files into the internal database of Certificate Management System.

Easy, GUI-based server installation and management

An installation wizard automates the installation and initial configuration process, helping you install Certificate Management System quickly and easily. Then after installation, you can locally or remotely administer Certificate Management System from various computers on your network (using the encryption, message integrity, and authentication services of SSL) with the help of an administration interface called the Certificate Management System window or the CMS window.


System Architecture
Certificate Management System comprises three servers, or main subsystems, and a number of system-level components that are shared by these servers. The main subsystems are:

The system-level components (also referred to as subsystems) are:

Figure 1.1 illustrates the high-level architecture of Certificate Management System.

Figure 1.1 Certificate Management System architecture

Table 1.1 gives an overview of each component's tasks. For detailed explanation for various components and how they interact, see the Netscape Certificate Management System Installation and Deployment Guide.

Table 1.1 Certificate Management System components

Component/Subsystem
Description
End entities

Various end entities that can request certificates from Certificate Management System:

For details on supported end-entity protocols, see "How Client Type Determines the End-Entity Interface".

End-entity protocols

Various protocols that Certificate Management System supports for allowing end-entity interaction with the server. For details, see "Certificate Request Formats Specific to End Entities".

Certificate Manager
Functions as the certificate authority (CA); it is the entity named in the issuer field of a certificate.

Exposes a number of interfaces used by protocol adapters and other CMS subsystems or components to perform the fundamental tasks of certificate management; it is a service that signs and revokes certificates and generates CRLs.

It can accept certificate requests directly from end entities as well as from Registration Managers to which it has delegated certain certificate management functions, such as authentication of an end entity.

Registration Manager
Functions as a full-fledged, remote registration front end to a Certificate Manager, enforcing policies (defined by the Policy engine) on certificate issuance, renewal, and revocation requests, key updates and recovery, and allied functions. Multiple Registration Managers can report to a single Certificate Manager (CA).

Data Recovery Manager
Handles encryption private key operations, such as key archival and recovery.

Internal database
An LDAP-compliant persistent storage system built into Certificate Management System. This database is a preconfigured version of Netscape Directory Server (version 4.x) installed transparently at the time of CMS installation.

Publishing directories
Used for publishing certificates and CRLs. Certificate Management System can publish to any LDAP-compliant directory (such as Netscape Directory Server 1.x, 3.x, and 4.x) used by organizations to maintain corporate data in a single place.

LDAP Directory Integration

Certificate Management System can function very closely with an LDAP-compliant directory, such as Netscape Directory Server, that organizations typically use to maintain corporatewide data about user and group accounts and other network resources. You can set up Certificate Management System to automatically publish certificate information and CRLs to a directory. The advantage of publishing certificates and CRLs to the directory is multifold:

For more information on setting up Certificate Management System to publish certificates and CRLs, see "LDAP Publishing".

Figure 1.2 Seamless integration with any LDAP-compliant directory

Seamless integration with any LDAP-compliant directory (see Figure 1.2.) makes possible the following:

How the Main Subsystems Function

You can install the Certificate Manager and Data Recovery Manager together in the same instance or separately in two different instances. Installation in separate instances requires additional configuration to connect the two subsystems together.

For information on Netscape Console and the CMS window, see "Administration Tasks and Tool".

Optionally, you can also install Registration Managers as standalone entities, and connect them to a Certificate Manager or Data Recovery Manager. A Registration Manager connected to a Certificate Manager functions as a trusted front end to the Certificate Manager by receiving end-entity requests, authenticating them, and forwarding them to the Certificate Manager for signing. After receiving a response from the Certificate Manager, the Registration Manager notifies the end entity of the results. Similarly, a Certificate Manager or Registration Manager connected to a Data Recovery Manager handles end users' requests related to the archival of encryption private keys. For more information on connecting subsystems, see "Trusted Managers".


Entry Points for Various Types of Users
Certificate Management System provides entry points for various kinds of user interaction.

Figure 1.3 Entry points for different types of users

As illustrated in Figure 1.3, the server provides three separate user entry points; each entry point addresses the needs of a specific user type. This is explained in Table 1.2.

Table 1.2 Certificate Server user-entry points

User
Component/Tool
CMS interface
Description
End entity
Web browser
End-entity gateway

This gateway provides the general front end for end-entity interactions with the server. Through this gateway, the Certificate Manager or Registration Manager serves the appropriate HTML forms for end-entity operations (the Data Recovery Manager does not have an end-entity interface). These include forms for certificate enrollment, retrieval, query, renewal, import, and revocation. These forms are collectively referred to as the end-entity services interface.
Agent
Web browser
Agent gateway

This gateway provides the general front end for agent interactions with the server. Through this gateway, a Certificate Manager, Registration Manager, or Data Recovery Manager serves the appropriate HTML forms for agent tasks. These forms are collectively referred to as the Agent Services interface.
Accessing Agent Services is a privileged operation; agents must use designated certificates for SSL client authentication to Certificate Management System.
Administrator

Netscape Console (CMS window)

Remote administration

The remote administration interface supports a GUI-based administration tool called Netscape Console that provides the general administration and management interface for Certificate Management System.
Administrators can use this tool to perform day-to-day operational and managerial duties, such as changing the server configuration, stopping and restarting the server, requesting and installing certificates, managing resources (certificates and requests), and setting up privileged-user information and associated access controls.
The CMS window can only be launched from within Netscape Console. Accessing this window is a privileged operation requiring a password-based authentication to Certificate Management System.

 

© Copyright 1999 Netscape Communications Corp., a subsidiary of America Online, Inc. All rights reserved.