Complete Contents
About This Guide
PART 1: Netscape Certificate Management System
Chapter 1: Introduction to Certificate Management System
Chapter 2: Administration Tasks and Tool
Chapter 3: Configuration
PART 2: Managing Certificate Management System
Chapter 4: Installing and Uninstalling Instances
Chapter 5: Starting and Stopping Instances
PART 3: System-Level Configuration
Chapter 6: Configuring Ports, Database, and SMTP Settings
Chapter 7: Managing Privileged Users and Groups
Chapter 8: Keys and Certificates
PART 4: Authentication
Chapter 9: Introduction to Authentication
Chapter 10: Using the PIN Generator Tool
Chapter 11: Configuring Authentication for End Entities
Chapter 12: Developing Authentication Plug-ins
PART 5: Job Scheduling and Notification
Chapter 13: Introduction to Job Scheduling and Notifications
Chapter 14: Configuring Jobs
PART 6: Policies
Chapter 15: Introduction to Policies
Chapter 16: Configuring Policies
PART 7: LDAP Publishing
Chapter 17: Introduction to LDAP Publishing
Chapter 18: Configuring Subsystems for LDAP Publishing
Chapter 19: Publishing CRLs
PART 8: Agent and End-Entity Interfaces
Chapter 20: Introduction to End-Entity and Agent Interfaces
Chapter 21: Customizing End-Entity and Agent Interfaces
PART 9: Logs
Chapter 22: Introduction to Logs
Chapter 23: Managing Logs
PART 10: Issuance and Management of End-Entity Certificates
Chapter 24: Issuing and Managing End-Entity Certificates
Chapter 25: Recovering Encrypted Data
PART 11: Appendixes
Appendix A: Distinguished Names
Appendix B: Backing Up and Restoring Data
Appendix C: Command-Line Utilities
Appendix D: Certificate Database Tool
Appendix E: Key Database Tool
Appendix F: Netscape Signing Tool
Appendix G: SSL Strength Tool
Appendix H: SSL Debugging Tool
Previous Next Contents Index Bookshelf


Chapter 7 Managing Privileged Users and Groups

Privileged users are users who are designated to perform privileged operations on Netscape Certificate Management System (CMS); these operations are privileged because no one else can perform them. You assign privileged-user status to a user by storing the user's login information in the internal database of Certificate Management System, associating the user's login information with a personal certificate (if the user is an agent or a trusted manager), and granting access permissions to various CMS resources by adding the user to appropriate groups.

This chapter describes the types of privileged users you need to set up for a CMS instance, what each user does, how Certificate Management System identifies these users, and how you create and manage these users. The chapter also describes what a group is and discusses the groups that Certificate Management System provides by default.

The chapter has the following sections:


Privileged-User Types and Responsibilities
After you install Certificate Management System, your first task is to set up privileged users. There are three types of privileged users: administrators, agents, and trusted managers.

The role of a privileged user--whether administrator, agent, or trusted manager--is determined by the group to which the user belongs. This is explained in "Groups and Their Privileges".

Administrators

Administrators are users who have been assigned CMS administration privileges--permission to access the CMS window and perform all the system administration tasks defined there. You assign these privileges to users by adding them to the internal database and assigning membership in a group called Administrators that Certificate Management System creates during installation.

For each CMS instance, the server must have at least one administrator. You can also have more than one individual administering the server.

During installation, Certificate Management System prompts you to provide information for creating the first user entry in the Administrators group. Following installation, therefore, this group has a single user entry. For more information about this group, see "Group for Administrators".

Certificate Management System authenticates users with administrator-level privileges based on its built-in authentication mechanism. This is explained in "Authentication of Administrators".

Agents

Agents are users who have been assigned end-entity certificate- and key-management privileges. Certificate Management System defines three agent roles, one for each of its subsystems: Certificate Manager agents, Registration Manager agents, and Data Recovery Manager agents.

Agents interact with the Certificate Manager, Registration Manager, and Data Recovery Manager to manage operations such as these:

All agents perform their tasks through HTML forms-based interfaces. The HTML forms an agent uses to manage a specific subsystem are grouped together and named after the subsystem they represent. For example, the forms-based interface provided for the Certificate Manager is called Certificate Manager Agent Services (see Figure 7.1). For more information, see "Agent Services".

Agents cannot access the CMS window and perform the tasks provided within the Netscape Console framework--unless they are given administrator privileges.

Figure 7.1 Agents use the HTML forms-based interface called Agent Services

Each subsystem installed in a CMS instance must have at least one agent. You can also have more than one individual managing agent services.

You create agents by adding them to the internal database, assigning membership in the appropriate agent groups, and identifying certificates that the agents must use for SSL client authentication to the subsystem (for it to service requests from the agents). For information about agents' certificates, see "Agent's Certificate for SSL Client Authentication". For information on creating agents for a CMS instance, see "Setting Up Agents".

During installation, Certificate Management System automatically creates appropriate groups with agent privileges. For more information about these groups, see "Groups for Agents".

Certificate Management System authenticates users with agent-level privileges based on its built-in authentication mechanism. This is explained in "Authentication of Agents".

Agent's Certificate for SSL Client Authentication

To make a user an agent for a subsystem, one of the things you must do is store the user's client (personal) certificate information in the internal database of the subsystem. For example, if you set up an agent for a Certificate Manager, you store the agent's client certificate in the internal database of that Certificate Manager. Then, when the subsystem receives a request from the agent, it uses this certificate to verify the authenticity of the request before servicing it. For details on how the subsystem verifies the authenticity of a request from an agent, see "Authentication of Agents".

If the user you want to set up as an agent does not own a client certificate, ask the user to get one. Depending on your company's PKI policy, the user could get the client certificate from either an internally deployed CA or any public CA.

Keep in mind that the CA that signs your agents' certificates must be trusted by the subsystem that processes requests sent by these agents; for example, if your subsystems are set up not to trust public CAs, your agents should not get their certificates signed by public CAs. Make sure that the CA's certificate exists in the subsystem's trust database and that the certificate is valid and trusted. To check whether or not the CA's certificate exists in a subsystem's trust database, follow the instructions in "Viewing the Certificate Database Contents".

Getting an Agent's Certificate from a Public CA

The following general guidelines explain how a user can get a client certificate from a public CA and how you can copy that certificate (in base-64 encoded form) to the internal database of the appropriate subsystem:

  1. The user sends a client certificate request to the public CA from the client machine that he or she will use to access the subsystem from the Agent Services interface. It is important that the user generate and submit this request from the machine she or he will use later to access the subsystem, because part of this request process generates a private key on the local machine. Alternatively, if location independence is required, the user can use a hardware token, such as a smart card, to generate and store the key pair (and the certificate when the user receives it from the public CA).
  2. When the user receives the certificate from the public CA, the user imports the certificate into the web browser that he or she will use to access the subsystem. It is a good idea to ask the user to inform you that the certificate has been installed.
  3. Ask the user to send you the certificate information sent by the public CA. In the information that you receive, locate the user's certificate in base-64 encoded form.
  4. You can also get the user's certificate from the public CA that issued it. Access the public CA site, search for the user's certificate, and locate the certificate in base-64 encoded form.

  5. Copy the base-64 encoded certificate, including the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- marker lines, to a text file.
  6. The copied information should look similar to the following example:

    -----BEGIN CERTIFICATE-----

    MIICJzCCAZCgAwIBAgIBAzANBgkqhkiG9w0BAQQFADBCMSAwHgYDVQQKExdOZXRzY2FwZSBDb21td W5pY2F0aW9uczngjhnMVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTk4MDgyNzE5MDAwMFoXDTk5M DIyMzE5MDAwMnbjdgngYoxIDAeBgNVBAoTF05ldHNjYXBlIENvbW11bmljYXRpb25zMQ8wDQYDVQQ LEwZQZW9wbGUxFzAVBgoJkiaJkIsZAEBEwdzdXByaXlhMRcwFQYDVQQDEw5TdXByaXlhIFNoZXR0e TEjMCEGCSqGSIb3DbndgJARYUc3Vwcml5YUBuZXRzY2FwZS5jb20wXDANBgkqhkiG9w0BAQEFAANL ADBIAkEAoYiYgthgtbbnjfngjnjgnagwJjAOBgNVHQ8BAf8EBAMCBLAwFAYJYIZIAYb4QgEBAQHBA QDAgCAMA0GCSqGSIb3DQEBBAUAA4GBAFi9FzyJlLmS+kzsue0kTXawbwamGdYql2w4hIBgdR+jWeL mD4CP4xzmKdvQ6IqD2q8DBs9lRQu9JYg129oaCLpZfMNTPnMc3WPKO2pWZWUm7waHEtdbo9vSpbJk XTM/2GhWbsO5vLdeOxrPGxihkHgV/vmqCl4HW7AorqGgyfygbhgthgutrhryj

    -----END CERTIFICATE-----

Important

When you copy the certificate, be sure to include the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- marker lines.

  1. Save the text file and use it to store a copy of the certificate in a subsystem's internal database (see "Step 3. Store the Agent's SSL Client Certificate in the Internal Database").
Getting an Agent's Certificate from Certificate Management System

The following general instructions explain how a user can get a client certificate from Certificate Management System and how you can copy that certificate (in base-64 encoded form) to the internal database of a subsystem:

  1. The user sends a client certificate request to Certificate Management System from the client machine that he or she will use to access the subsystem from the Agent Services interface. It is important that the user generate and submit this request from the machine he or she will use later to access the subsystem, because part of this request process generates a private key on the local machine. Alternatively, if location independence is required, the user can also use a hardware token, such as a smart card, to generate and store the key pair (and the certificate when the user receives it from the public CA).
  2. Depending on how your Certificate Management System is configured for certificate issuance, one of the following events happen:
  3. When the user receives the certificate, the user must import the certificate into the web browser that he or she will use to access the subsystem. It is a good idea to ask the user to inform you that the certificate has been installed.
  4. After the user imports the certificate into the web browser, you need to copy the certificate (in base-64 encoded form) in order to be able to add it to a subsystem's internal database.
To copy an agent's certificate:

  1. Open a web browser window.
  2. Go to the Certificate Management System home page for end entities (by default, it is called End Entity Registration Services).
  3. The default URL for this page is in this form:

    http://<host_name>:<end_entity_HTTP_port> or

    https://<host_name>:<end_entity_HTTPS_port>

    In both cases, the <host_name> must be in this form: <machine_name>.<your_domain>.<domain>

    For example, the URL may look like this: https://testCA.netscape.com

  4. Click the Retrieval tab.
  5. In the left frame, click either the List Certificates or Search For Certificates link, and search for the user's certificate.
  6. In the page listing the results of your search, click the Details button (next to the corresponding user's entry) to see detailed information about the certificate.
  7. Scroll down to the section named "Installing This Certificate in a Client," which contains the user's certificate in base-64 encoded form.
  8. Copy the base-64 encoded certificate, including the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- marker lines, to a text file.
  9. The copied information should look similar to the following example:

    -----BEGIN CERTIFICATE-----

    MIICJzCCAZCgAwIBAgIBAzANBgkqhkiG9w0BAQQFADBCMSAwHgYDVQQKExdOZXRzY2FwZSBDb21td W5pY2F0aW9uczngjhnMVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTk4MDgyNzE5MDAwMFoXDTk5M DIyMzE5MDAwMnbjdgngYoxIDAeBgNVBAoTF05ldHNjYXBlIENvbW11bmljYXRpb25zMQ8wDQYDVQQ LEwZQZW9wbGUxFzAVBgoJkiaJkIsZAEBEwdzdXByaXlhMRcwFQYDVQQDEw5TdXByaXlhIFNoZXR0e TEjMCEGCSqGSIb3DbndgJARYUc3Vwcml5YUBuZXRzY2FwZS5jb20wXDANBgkqhkiG9w0BAQEFAANL ADBIAkEAoYiYgthgtbbnjfngjnjgnagwJjAOBgNVHQ8BAf8EBAMCBLAwFAYJYIZIAYb4QgEBAQHBA QDAgCAMA0GCSqGSIb3DQEBBAUAA4GBAFi9FzyJlLmS+kzsue0kTXawbwamGdYql2w4hIBgdR+jWeL mD4CP4xzmKdvQ6IqD2q8DBs9lRQu9JYg129oaCLpZfMNTPnMc3WPKO2pWZWUm7waHEtdbo9vSpbJk XTM/2GhWbsO5vLdeOxrPGxihkHgV/vmqCl4HW7AorqGgyfygbhgthgutrhryj

    -----END CERTIFICATE-----

Important

When you copy the certificate, be sure to include the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- marker lines.

  1. Save the text file and use it to store a copy of the certificate in a subsystem's internal database (see "Step 3. Store the Agent's SSL Client Certificate in the Internal Database").
Trusted Managers

Trusted managers are those CMS subsystems that are connected to other CMS subsystems and that are trusted to perform specific functions for them. In other words, a trusted manager acts as a front end to the subsystem that trusts it, performing specific functions, depending on the subsystem to which it is connected. You establish this trust between the two subsystems by configuring them to function in certain way.

Subsystems That Can Function as Trusted Managers

In Certificate Management System, the Registration Manager or Certificate Manager can function as a trusted manager; the Data Recovery Manager cannot function as a trusted manager. You can configure

Connectors for Linking Trusted Managers

Certificate Management System supports proprietary HTTPS connectors for linking CMS subsystems. You can use these connectors to make the following connections:

Figure 7.2 illustrates how a trusted Registration Manager communicates with a Certificate Manager.

Figure 7.2 Connectivity service between a trusted Registration Manager and other subsystems

Keep in mind that a trusted manager does not take on the main functions of the subsystem that trusts it. For example, if a Registration Manager is connected to a Certificate Manager, the Registration Manager has no authority to issue (sign) certificates or CRLs. It receives end-entity requests, authenticates them, and forwards them to the Certificate Manager for signing. After receiving a response from the Certificate Manager, it notifies the end entity of the results.

Similarly, a Certificate Manager or Registration Manager connected to a Data Recovery Manager has no authority to archive and recover end users' encryption private keys.

You can configure a subsystem to trust one or more managers. You do this by adding these managers as privileged users to the internal database of that subsystem, assigning them memberships in the appropriate group, and identifying the certificates the managers must use for SSL client authentication to the subsystem they report to. For information about adding a trusted manager, see "Setting Up Trusted Managers".

During installation, Certificate Management System automatically creates a group with trusted manager privileges. For more information about this group, see "Group for Trusted Managers".

Trusted Manager's Certificate for SSL Client Authentication

By default, a Registration Manager that has been set up to function as a trusted manager uses its signing certificate for SSL client authentication to the subsystem that trusts it. For information on this certificate, see "Signing Key Pair and Certificate". Similarly, a Certificate Manager that has been set up to function as a trusted manager uses its SSL server certificate for SSL client authentication to the subsystem that trusts it. For information on this certificate, see "SSL Server Key Pair and Certificate".

When you set up a trusted manager for a CMS subsystem, it is important to know which CA has issued the certificate the trusted manager will use for SSL client authentication to the subsystem. The certificate must be issued by a CA that the subsystem trusts. For example, when you set up a trusted Registration Manager for a subsystem, it is important to know which CA has issued the Registration Manager's signing certificate. The certificate must be issued by a CA that the subsystem trusts. If the subsystem is a Certificate Manager, the certificate must be issued by either the Certificate Manager itself or a CA that the Certificate Manager trusts. Similarly, if the Registration Manager is connected to a Data Recovery Manager, the signing certificate must be issued by the CA that the Data Recovery Manager trusts.

The issuer of a Registration Manager's signing certificate is the CA from which you requested the certificate when you installed the Registration Manager. If you have renewed the certificate since installation, the issuer is the CA from which you requested the renewed certificate. Check the signing certificate for its issuer's name; see "Viewing the Certificate Database Contents". You can also find this information by looking at the installation worksheet you completed in preparation for installing the system.

Once you learn the issuer's name, verify that this CA's certificate exists in the subsystem's trust database and that the certificate is trusted. To check whether the CA's certificate exists in the subsystem's trust database, follow the instructions in "Viewing the Certificate Database Contents".


Groups and Their Privileges
In Certificate Management System, a group refers to a collection of privileged users--administrators, agents, or trusted Registration Managers. Each group has predetermined privileges, based on its access control. All users belonging to a group automatically inherit the privileges of that group.

When you installed Certificate Management System, it automatically created the following groups for the subsystems you installed:

These default groups are created in the internal database of the appropriate CMS instance. They can help you set up your privileged users quickly and easily.

Do not delete or change the group names. Also, don't change the internal database in which the groups are stored. However, you can add new privileged users to these groups; see "Setting Up Privileged Users".

Group for Administrators

During installation, Certificate Management System automatically creates a group called Administrators and adds a user to this group; the server sets the name of this user to the certificate administrator ID (of the CMS administrator) you specified during installation. If you don't remember this name, see the installation worksheet you completed in preparation for installing the system. For example, if you specified admin as the user ID for the CMS administrator, the name of the user in the Administrators group will be admin.

Keep in mind that the Administrators group must always contain at least one user entry. This means you can delete the entry that was created in this group during installation, provided you add another user to the group.

After installation, you must do the following:

  1. Log in to the CMS window with the administrator ID and password specified during installation.
  2. Depending on the components you installed, create one or more privileged users and add them to the appropriate groups. It is recommended that you add at least one more user to the Administrators group. For instructions on creating privileged users and adding them to one or more groups, see "Setting Up Privileged Users".
Groups for Agents

Depending on the subsystems you chose to install, Certificate Management System automatically creates a combination of the following groups in a CMS instance:

Group for Certificate Manager Agents

When the Certificate Manager is installed, a group called Certificate Manager Agents is automatically created in its internal database. After installation, this group has a single user entry--when you get the first agent certificate from the Certificate Manager, the server automatically adds the initial administrator as the agent and stores a copy of the agent certificate against that user entry. The user ID for this agent user is the same as the certificate administrator ID (as specified during installation).

The Certificate Manager Agents group has access rights to agent-specific resources of the Certificate Manager; that is, privileged users you add to this group automatically inherit access rights to the agent port of the Certificate Manager. For information on ports, see "CMS Ports".

After installation, you should add to this group the privileged users to whom you want to assign Certificate Manager agent privileges. All agents who belong to the Certificate Manager Agents group can access the Certificate Manager Agent Services interface; see "Certificate Manager Agent Services".

For an agent to be able to carry on SSL client-authenticated communication with a Certificate Manager, you need to do additional configurations. See "Setting Up Agents".

Group for Registration Manager Agents

When the Registration Manager is installed, a group called Registration Manager Agents is automatically created in its internal database. By default, this group has no entries.

The Registration Manager Agents group has access rights to agent-specific resources of the Registration Manager; that is, privileged users you add to this group automatically inherit access rights to the agent ports of the Registration Manager. For information on ports, see "CMS Ports".

After installation, you should add to this group the privileged users to whom you want to assign Registration Manager agent privileges. All agents who belong to the Registration Manager Agents group can access the Registration Manager Agent Services interface; see "Registration Manager Agent Services"

For an agent to be able to do SSL client-authenticated communication with a Registration Manager, you need to do additional configurations. See "Setting Up Agents".

Group for Data Recovery Manager Agents

When the Data Recovery Manager is installed, a group called Data Recovery Manager Agents is automatically created in its internal database. By default, this group has no entries.

The Data Recovery Manager Agents group has access rights to agent-specific resources of the Data Recovery Manager; that is, privileged users you add to this group automatically inherit access rights to the agent ports of the Data Recovery Manager. For information on ports, see "CMS Ports".

After installation, you should add to this group the privileged users to whom you want to assign Data Recovery Manager agent privileges. All agents who belong to the Data Recovery Manager Agents group can access the Data Recovery Manager Agent Services interface; see "Data Recovery Manager Agent Services"

For an agent to be able to carry on SSL client-authenticated communication with a Data Recovery Manager, you need to do additional configurations. See "Setting Up Agents".

Group for Trusted Managers

When the Certificate Manager, Registration Manager, or Data Recovery Manager is installed, a group called Trusted Managers is automatically created in its internal database. By default, this group has no entries.

The Trusted Managers group has access rights to the corresponding agent gateway; that is, the subsystems you add to this group automatically inherit access rights to the agent port of the corresponding Certificate Manager, Registration Manager, or Data Recovery Manager. For information on ports, see "CMS Ports".

After installation, you should add to this group the subsystems that you want to function as trusted managers. All subsystems that belong to the Trusted Managers group can carry on SSL client-authenticated communication with the subsystem that trusts them and receive responses back.

For a Registration Manager to be able to do SSL client-authenticated communication with a subsystem, you need to do additional configurations. See "Setting Up Trusted Managers".


Setting Up Privileged Users
Setting up privileged users for a CMS instance involves adding the appropriate user information to the internal database of that instance. You can set up any number of privileged users for a CMS instance. If the user is a person (that is, an administrator or agent), you can put that user into as many groups as you like.

This section describes the following tasks:

Setting Up Administrators

You need at least one administrator for each instance of Certificate Management System. To understand the role of an administrator, see "Administrators".

This section explains how to add administrators to a CMS instance manually. To import users with administrator-level privileges from a Netscape Certificate Server version 1.0x database into the internal database used by a CMS instance, see "Appendix A, Migrating from Certificate Server" in the Netscape Certificate Management System Deployment and Installation Guide.

Setting up an administrator involves the following steps:

Step 1. Find the Required Information

Note the user's corporate information, such as name, email address, and phone number.

Step 2. Add the Information to the Internal Database

To add the information to the internal database of a CMS instance:

  1. Access the CMS window (see "Accessing the CMS Window").
  2. Click Users and Groups.
  3. The Users tab appears.

  4. Click Add.
  5. The Edit User Information window appears.

  6. Specify information as appropriate:
  7. User ID. Type a user ID or login name for the user. The ID can be an alphanumeric string of up to 255 characters. Give this ID to the user. The user is required to enter this ID in the login screen of the CMS window; see "Accessing the CMS Window".

    Full name. Type the user's full name. The user never sees this. This field is to help you keep track of your users. The name can be an alphanumeric string of up to 255 characters.

    Password. Type a password of up to eight characters for the user. Give this password to the user. The user is required to enter this password in the login screen of the CMS window; see "Accessing the CMS Window".

    Confirm password. Retype the password exactly as you typed it in the Password field.

    Email. Type the user's complete email address. The user never sees this. This field is to help you contact the user, if the need arises.

    Phone. Type the user's phone number. The user never sees this. This field is to help you contact the user, if the need arises.

    Group. Select Administrators; for more information about this group, see "Group for Administrators". When you set up a user, you can add him or her to only one group. To add the user to another group, see "Changing Members in a Group".

  8. Click OK.
  9. You are returned to the Users tab. The administrator you just added will be displayed in the list of users.

  10. Click Refresh to view the updated configuration.
Setting Up Agents

You need an agent for each subsystem installed in a given CMS instance. To understand the role of an agent, see "Agents". This section explains how to add agents to a CMS instance manually. To import users with agent-level privileges from a Netscape Certificate Server version 1.0x database, see "Appendix A, Migrating from Certificate Server" in the Netscape Certificate Management System Deployment and Installation Guide.

Setting up an agent involves the following steps:

Step 1. Find the Required Information

Before adding an agent to the internal database of a CMS instance:

Step 2. Add the Information to the Internal Database

To add the information to the internal database of a CMS instance:

  1. Access the CMS window (see "Accessing the CMS Window").
  2. Click Users and Groups.
  3. The Users tab appears.

  4. Click Add.
  5. The Edit User Information window appears.

  6. Specify information as appropriate.
  7. The information you enter here is to help you keep track of your agent users; the user never sees or uses it. The server relies solely on the agent's client certificate (which you will add next) for authentication.

    User ID. Type the user ID or login name. The ID can be an alphanumeric string of up to 255 characters.

    Full name. Type the user's full name. The name can be an alphanumeric string of up to 255 characters.

    Password. You can choose to leave this field blank.

    Confirm password. You can choose to leave this field blank.

    Email. Type the user's complete email address.

    Phone. Type the user's phone number.

    Group. Choose the appropriate agent group; for more information about this group, see "Groups for Agents". When you set up a user, you can add her or him to only one group. To add the user to another group, see "Changing Members in a Group".

  8. Click OK.
  9. You are returned to the Users tab. The agent you just added will be displayed in the list of users.

What you do next depends on whether you have the agent's certificate:

Step 3. Store the Agent's SSL Client Certificate in the Internal Database

To store a copy of an agent's SSL client certificate in the internal database:

  1. In the Users tab, click Certificates.
  2. The Manage User Certificates window appears.

  3. Click Import.
  4. The Import Certificate window appears.

  5. Click inside the text area, and paste the user's certificate in base-64 encoded form.
  6. Be sure to include the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- marker lines.

  7. Click OK.
  8. You are returned to the Manage User Certificates window. The certificate you imported should now be listed in this window.

  9. To view the certificate you imported, select it and click View.
  10. The certificate information appears.

  11. Click Done.
  12. You are returned to the Users tab.

  13. Click Refresh to view the updated configuration.
Step 4. Check the Certificate Database for the CA Certificate

The CA that signed the agent's SSL client certificate must be trusted by the subsystem that services requests from the agent. Make sure that this CA's certificate exists in the subsystem's certificate database (internal or external) and that it is trusted. To check whether the CA's certificate exists in your subsystem's certificate database, follow the instructions in "Viewing the Certificate Database Contents".

Setting Up Trusted Managers

You can set up a Registration Manager or Certificate Manager to function as a trusted manager to another CMS instance. This section explains how to do this.

To understand the role of a trusted manager in your PKI, see "Trusted Managers".

Setting Up a Registration Manager as a Trusted Manager

You can set up a remote Registration Manager to function as a trusted manager to a Certificate Manager, Registration Manager, or Data Recovery Manager. The setup process involves the following steps:

Step 1. Find the Required Information

Before setting up a Registration Manager to function as a trusted manager to another CMS subsystem:

Step 2. Create a User Entry for the Registration Manager

In this step, you create a privileged-user entry for the Registration Manager in the internal database of the subsystem. As a part of creating this entry, you also add the user entry to the Trusted Managers group in order to give the entry access privileges to the agent port of the subsystem.

To create a user entry with appropriate access privileges for a Registration Manager:

  1. Access the CMS window for the subsystem (see "Accessing the CMS Window").
  2. Click Users and Groups.
  3. The Users tab appears.

  4. Click Add.
  5. The Edit User Information window appears.

  6. Specify information as appropriate.
  7. The information you enter here is to help you keep track of the Registration Manager; the subsystem never uses it. The subsystem relies solely on the Registration Manager's SSL client certificate (which you will add in Step 3) for authentication.

    User ID. Type the Registration Manager's instance ID (or any other ID that will help you identify the Registration Manager in the list of privileged users). The ID can be an alphanumeric string of up to 255 characters.

    Full name. Type the full host name of the Registration Manager. The host name can be an alphanumeric string of up to 255 characters. It must be in this form: <machine_name>.<your_domain>.<domain>

    Password. Leave this field blank.

    Confirm password. Leave this field blank.

    Email. Leave this field blank.

    Phone. Leave this field blank.

    Group. Select Trusted Managers; for more information about this group, see "Group for Trusted Managers".

  8. Click OK.
  9. You are returned to the Users tab. The Registration Manager you just added is displayed in the list of users.

What you do next depends on whether you have the Registration Manager's SSL client certificate:

Step 3. Copy the Registration Manager's Certificate to the Internal Database

In this step, you add a copy of the Registration Manager's SSL client authentication certificate to the internal database of the subsystem and associate the certificate with the user entry you created in Step 2.

To store the Registration Manager's SSL client certificate in the internal database of the subsystem:

  1. In the Users tab, select the user entry you just added for the Registration Manager and click Certificates.
  2. The Manage User Certificates window appears.

  3. Click Import.
  4. The Import Certificate window appears.

  5. Click inside the text area, and paste the Registration Manager's certificate in base-64 encoded form.
  6. Be sure to include the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- marker lines.

  7. Click OK.
  8. You are returned to the Manage User Certificates window. The certificate you imported should now be listed in this window.

  9. To view the certificate you imported, select it and click View.
  10. The certificate information appears. Verify that the certificate you added is the correct one.

  11. Click Done.
  12. You are returned to the Users tab.

Step 4. Check the Certificate Database for the CA Certificate

The issuer of the Registration Manager's certificate that you added in Step 3 must be trusted by the subsystem that services certificate requests approved by the Registration Manager. Make sure that this CA's certificate exists in the subsystem's certificate database (internal) and that it is trusted. To check whether the CA's certificate exists in the subsystem's certificate database, follow the instructions in "Viewing the Certificate Database Contents".

Step 5. Configure the Connector Settings

In this step, you configure the connector settings of the Registration Manager. This enables the Registration Manager to utilize the proprietary HTTPS connectors to communicate with the subsystem (following successful SSL client authentication).

  1. Access the CMS window for the Registration Manager (see "Accessing the CMS Window").
  2. In the navigation tree, click Registration Manager.
  3. The General Settings tab appears.

  4. Click the Connectors tab.

  5. In the "List of connectors" select the connector:
  6. For the purposes of completing these instructions, let us assume you selected Certificate Manager Connector.

    The Edit Connector dialog box appears.

  7. Click the Enable checkbox to enable the connector configuration.
  8. Click Remote, and enter the appropriate information:
  9. Host name. Type the full host name of the subsystem that trusts this Registration Manager; in this case, it would be the host name of the Certificate Manager. The Registration Manager uses this name to locate the Certificate Manager. The format for the host name must be as follows:

    <machine_name>.<your_domain>.<domain>

    Port number. Type the number of the TCP/IP port at which the Certificate Manager will listen to requests from the trusted Registration Manager. The default port designated for communication between a trusted Registration Manager and a subsystem is the agent's port. See "Agent Port".

    The sample screen above shows how to connect the Registration Manager to a Certificate Manager running on a host called nolan-nt.mcom.com listening for HTTPS requests on port 888.

  10. Click OK.
  11. You are returned to the Connectors tab.

  12. To save your changes, click Save.
  13. The CMS configuration is modified. If the changes you made require you to restart the server, you will be prompted accordingly. In that case, stop and restart the server.

Setting Up a Certificate Manager as a Trusted Manager

You can set up a Certificate Manager to function as a trusted manager to a remote Data Recovery Manager. The setup process involves the following steps:

Step 1. Find the Required Information

Before setting up a Certificate Manager to function as a trusted manager to a Data Recovery Manager:

Step 2. Create a User Entry for the Certificate Manager

In this step, you create a privileged-user entry for the Certificate Manager in the internal database of the Data Recovery Manager. As a part of creating this entry, you also add the user entry to the Trusted Managers group in order to give the entry access privileges to the agent port of the Data Recovery Manager.

To create a user entry with appropriate access privileges for a Certificate Manager:

  1. Access the CMS window for the subsystem (see "Accessing the CMS Window").
  2. Click Users and Groups.
  3. The Users tab appears.

  4. Click Add.
  5. The Edit User Information window appears.

  6. Specify information as appropriate.
  7. The information you enter here is to help you keep track of the Certificate Manager; the Data Recovery Manager never uses it. The Data Recovery Manager relies solely on the Certificate Manager's SSL server certificate (which you will add in Step 3) for authentication.

    User ID. Type the Certificate Manager's instance ID (or any other ID that will help you identify the Certificate Manager in the list of privileged users). The ID can be an alphanumeric string of up to 255 characters.

    Full name. Type the full host name of the Certificate Manager. The host name can be an alphanumeric string of up to 255 characters. It must be in this form: <machine_name>.<your_domain>.<domain>

    Password. Leave this field blank.

    Confirm password. Leave this field blank.

    Email. Leave this field blank.

    Phone. Leave this field blank.

    Group. Select Trusted Managers; for more information about this group, see "Group for Trusted Managers".

  8. Click OK.
  9. You are returned to the Users tab. The Certificate Manager you just added is displayed in the list of users.

What you do next depends on whether you have the Certificate Manager's SSL server certificate:

Step 3. Copy the Certificate Manager's Certificate to the Internal Database

In this step, you add the Certificate Manager's SSL server certificate to the internal database of the Data Recovery Manager and associate the certificate with the user entry you created in Step 2.

To store the Certificate Manager's SSL server certificate in the internal database of the subsystem:

  1. In the Users tab, select the user entry you just added for the Certificate Manager and click Certificates.
  2. The Manage User Certificates window appears.

  3. Click Import.
  4. The Import Certificate window appears.

  5. Click inside the text area, and paste the Certificate Manager's certificate in base-64 encoded form.
  6. Be sure to include the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- marker lines.

  7. Click OK.
  8. You are returned to the Manage User Certificates window. The certificate you imported should now be listed in this window.

  9. To view the certificate you imported, select it and click View.
  10. The certificate information appears. Verify that the certificate you added is the correct one.

  11. Click Done.
  12. You are returned to the Users tab.

Step 4. Check the Certificate Database for the CA Certificate

The issuer of the Certificate Manager's certificate that you added in Step 3 must be trusted by the Data Recovery Manager that services the key archival requests initiated by the Certificate Manager. Make sure that this CA's certificate exists in the Data Recovery Manager's certificate database (internal) and that it is trusted. To check whether the CA's certificate exists in the Data Recovery Manager's certificate database, follow the instructions in "Viewing the Certificate Database Contents".

Step 5. Configure the Connector Settings

In this step you configure the connector settings of the Certificate Manager. This enables the Certificate Manager to utilize the proprietary HTTPS connectors to communicate with the Data Recovery Manager (following successful SSL client authentication).

Note that during the installation of a Data Recovery Manager, you were prompted to specify the host name and port number of the Certificate Manager to which the Data Recovery Manager will be connected. If you specified this information, you are not required to go through this step. However, it is recommended that you verify the connector setting and make sure that the information you entered during installation is correct.

  1. Access the CMS window for the Certificate Manager (see "Accessing the CMS Window").
  2. In the navigation tree, click Certificate Manager.
  3. The General Settings tab appears.

  4. Click the Connectors tab.

  5. In the "List of connectors" select Data Recovery Manager Connector and click Edit.
  6. The Edit Connector dialog box appears.

  7. Click the Enable checkbox to the enable the connector configuration.
  8. Click Remote, and enter the appropriate information:
  9. Host name. Type the full host name of the Data Recovery Manager that trusts this Certificate Manager. The Certificate Manager uses this name to locate the Data Recovery Manager. The format for the host name must be as follows:

    <machine_name>.<your_domain>.<domain>

    Port number. Type the number of the TCP/IP port at which the Data Recovery Manager will listen to requests from the trusted Certificate Manager. The port designated for communication between a trusted Certificate Manager and a Data Recovery Manager is the agent port. See "Agent Port".

    The sample screen above shows how to connect the Certificate Manager to a Data Recovery Manager running on a host called nolan- nt.netscape.com listening for HTTPS requests at port 8100.

  10. Click OK.
  11. You are returned to the Connectors tab.

  12. To save your changes, click Save.
  13. The CMS configuration is modified. If the changes you made require you to restart the server, you will be prompted accordingly. In that case, stop and restart the server.


Changing Privileged-User Information
You can change privileged-user information in several ways:

Changing a Privileged User's Login Information

To change a privileged user's login information:

  1. Access the CMS window (see "Accessing the CMS Window").
  2. Click Users and Groups.
  3. The Users tab appears.

  4. In the User ID list, select the user you want to edit, and click Edit.
  5. The Edit User Information window appears.

  6. Make the appropriate modifications.
  7. If you need details about individual fields, see "Setting Up Privileged Users".

  8. Click OK.
  9. You are returned to the Users tab.

  10. Click Refresh to view the updated configuration.
Changing a Privileged User's Certificate

To change a privileged user's certificate:

  1. Access the CMS window (see "Accessing the CMS Window").
  2. Click Users and Groups.
  3. The Users tab appears.

  4. In the User ID list, select the user whose certificate information you want to change, and click Certificates.
  5. The Manage User Certificate window appears.

  6. Take the appropriate action:
  7. Click Done.
  8. You are returned to the Users tab.

  9. Click Refresh to view the updated configuration.
Changing Members in a Group

You can add or remove members from all groups. Keep in mind that the group for administrators must have at least one user entry. For details, see "Groups and Their Privileges".

To change a group's members:

  1. Access the CMS window (see "Accessing the CMS Window").
  2. Click Users and Groups.
  3. The Users tab appears.

  4. Click the Groups tab.

  5. In the Group Name list, select the group you want to change, and click Edit.
  6. The Edit Group Information window appears.

  7. Make the appropriate changes:
  8. Click OK when you are done with the changes.
  9. You are returned to the Groups tab.

  10. Click Refresh to view the updated configuration.

Deleting a Privileged User
You can delete privileged users from the internal database. Before deleting a user, make sure the user is not a member of any of the groups.

To delete a privileged user from the internal database:

  1. Access the CMS window (see "Accessing the CMS Window").
  2. Click Users and Groups.
  3. The Users tab appears.

  4. In the User ID list, select the user you want to delete, and click Edit.
  5. The Edit User Information window appears.

  6. Check the Membership area to see whether the user belongs to any of the groups.
  7. When you have removed the user from all groups, click the Users tab again.
  8. Select the user again and click Delete.
  9. When prompted, confirm the deletion.
  10. The user entry is deleted from the internal database.

  11. Click Refresh to view the updated configuration.

 

© Copyright 1999 Netscape Communications Corp., a subsidiary of America Online, Inc. All rights reserved.