Chapter 12 Managing Keys and Certificates
Security Manager allows you to manage keys and certificates used by EAServer.
This section describes the tasks involved in accessing and managing the Sybase Security Manager.
You can install and use the standalone Security Manager on a client machine to manage client keys, certificates, and trust information in a local database. The client Security Manager is completely independent of Jaguar Manager and EAServer. Except for the login screen, the standalone Security Manager is identical to the version used to manage server keys and certificates.
The client's Security Manager allows C++ CORBA clients and Java applications to access servers using SSL features over IIOPS connections. For more information, see these chapters:
To start Security Manager, see the EAServer System Administration guide.
Changing the user PIN
The initial PIN for the PKCS #11 token is "sybase". You can also use the same PIN to log in to Security Manager and, if installed, the Sybase PKCS #11 token in Netscape. To change to a more secure PIN:
Restart Netscape for the new PIN to propagate to the Sybase PKCS #11 token.
Displaying PKCS #11 module information
Logging out of the PKCS #11 module
You are still logged in to Jaguar Manager but can no longer access keys or certificates.
The test CA is a signing authority that signs user certificate requests. These certificates can be used by clients and EAServer to test the security features of your applications. Certificates signed by the test CA are not intended for commercial applications. If you already have an in-house CA or other signing authority, you may not need to use the test CA.
The test CA must exist before you can access the Process Certificate Request and Generate User Test Certificate options.
Creating a test CA
To verify that the test CA is available, highlight the CA Certificates folder. You should see the Sybase Jaguar User Test CA on the right side of the window. If not, you must generate the test CA.
The Sybase Jaguar User Test CA displays on the right side of the window. You can now generate test certificates signed by the test CA and process certificate requests.
Generating a user certificate signed by the test CA
Property | Description | Comments/example |
---|---|---|
Key Strength | Select the authentication
key strength. The greater the number, the stronger the encryption.
Your options are:
|
For international users, key strength is 512. |
Key Label | The name that identifies the certificate. | Required field. The label must be unique among all labels used for all certificates. |
Validity Period | From the drop-down list, select the length of time that the certificate is valid. | When a client (or server) presents a certificate for authentication, EAServer (or the browser) checks to see if the certificate has expired. |
Cert Usage | Click the check box for
either or both:
|
The same certificate can be used by a client and/or EAServer. |
Common Name | Your first and last name. | Required field. |
User ID | Any ID that would further identify you. | |
Organization | The name of your company, university, or other organization. | Required field.
|
Organization Unit | The name of a department within your organization. | |
Locality | The location of your organization. | You must supply at least
one of:
|
State/Province | State or province name. | |
Country | Your two-digit country code; for example, "U.S." | |
Requester Name | The person requesting the certificate. | |
Server Admin | The name, if any, of the server administrator. | |
Your e-mail address. | ||
Mark Private Key Exportable | Checked by default, this property allows you to export this certificate along with its private key. | See "Installing and exporting certificates" for more information.
If checked, you can later uncheck this property. Once unchecked, you cannot change this property. If unchecked, you cannot export this certificate and private key. |
Processing a certificate request
Security Manager can process a certificate request generated from elsewhere. The test CA signs the request and generates the certificate.
-----BEGIN NEW CERTIFICATE REQUEST-----
MIH4MIGjAgEAMD4xCjAIBgNVBAMTAWExCjAIBgNVBAoTAWExCjAIBgNVBAcTAWEx CzAJBgNVBAgTAmNhMQswCQYDVQQGEwJ1czBcMA0GCSqGSIb3DQEBAQUAA0sAMEgC QQC9Yn9AOzflqIarPCC7eRdr3C0wrIG+3B2T+pEs9sdgEjnc/bw1GfxcZKYamWXg G1KQycFqkdrFNP79fgRCOd3xAgMBAAGgADANBgkqhkiG9w0BAQQFAANBAIEljmCB HbFdNj0MtFDa002f/Trl6FtGCh7Gs23pZlWIUzDlGFowiuJY6iMDzd/1bJz5yYB+ IvlM9Ath/zTF2eY=
-----END NEW CERTIFICATE REQUEST-----
-----BEGIN CERTIFICATE-----
MIICYTCCAcqgAwIBAgIBBzANBgkqhkiG9w0BAQQFADCBgjEzMDEGA1UEAxMqU3li YXNlIEphZ3VhciBVc2VyIFRlc3QgQ0EgKFRFU1QgVVNFIE9OTFkpMSAwHgYDVQQK ExdTeWJhc2UgSmFndWFyIFVzZXIgVGVzdDEpMCcGA1UEBxMgU3liYXNlIEphZ3Vh ciBVc2VyIFRlc3QgTG9jYWxpdHkwHhcNOTgwNzAyMDIzOTEzWhcNOTgwOTAyMDIz OTEzWjBHMQ0wCwYDVQQDEwR0ZXN0MQ0wCwYDVQQKEwR0ZXN0MQ0wCwYDVQQHEwR0 ZXN0MQswCQYDVQQIEwJjYTELMAkGA1UEBhMCdXMwXDANBgkqhkiG9w0BAQEFAANL ADBIAkEAvzvqs9yjW/PDCt/Rotp9x9PHrULLeGOLlVSubo9poY1f5OYwsrjfaOtT bkhWDrakuwJJk8smDNSAl93tdP9r8wIDAQABo2UwYzAMBgNVHRMEBTADAQEAMB0G A1UdDgQWBBTAT0n9qsvdfqc9NzGPA5oLKsMzJjAhBgNVHSMEGjAYoBYEFGLT8qZb 3LtGjw84nxna9YBHb7q6MBEGCWCGSAGG+EIBAQQEAwIAwDANBgkqhkiG9w0BAQQF AAOBgQB3OStVqhoWT66yXNsrznCg9t8yNClobnKGOJTqt+VbhV7BUgBH+fVSjf7v xJyV4twwlBvU08PsKYQGj4sJ1Ao3lsOXWrr6YZIHZZ6p9P8JXjY016Vg9g5SDmEV jgGbwy6ZOZYx27npp4X31WXY27KDZrV/FrwvF6/Pv6mZY7ijUw==
-----END CERTIFICATE-----
Certificates signed by the test CA are intended for testing only. In a real-life situation, the CA would verify user information to establish identity.
Exporting the test CA certificate
You can export certificates, including the test CA certificate. Exporting the test CA certificate allows you to load it into Netscape 4.0x browsers and mark it trusted. This prevents Netscape from displaying warnings about untrusted certificate authorities when you use listeners that use certificates signed by the test CA.
For general information about the Export Certificate wizard and certificate types, see "Installing and exporting certificates".
Loading the test CA's certificate into Netscape 4.0x
You must be logged in to the Netscape token.
application/x-x509-ca-cert
application/x-x509-ca-cert crt cer ber derThis line ensures that Netscape recognizes the .crt file extension.
Netscape now allows you to connect to EAServer ports that require authentication, and accepts the certificates signed by the test CA without displaying warnings.
This section describes the tasks involved in key management.
To view the private keys installed in the security module, select the Private Keys folder. The private keys display on the right side of the window.
Security Manager displays any private key that does not have a certificate associated with it, including private keys that have an outstanding certificate request. For example, you may generate a key pair and request a certificate from a CA at the same time. It may take several days to receive your certificate. In the meantime, the private key displays when you highlight the Private Keys folder.
Sybase recommends that you delete any private key that does not have an outstanding certificate request associated with it.
Viewing information about a private-key
Deleting a private key
Security Manager comes with several preinstalled CA certificates. EAServer accepts client certificates only if they have been signed by a trusted CA. You can modify the trust attribute for any of the preinstalled certificates. See "Viewing certificate, trust, and export information" for more information.
Generating a key pair and requesting a certificate
You can generate a key pair and send the certificate request to a CA to be signed. Once the CA has signed and returned the request, you can install the certificate.
The new private key appears on the right side of the window when you highlight the Private Keys folder. Once the certificate is received and installed, the private key is removed from the private key list.
Property | Description | Comments/example |
---|---|---|
Key Strength | Select the authentication
key strength. The greater the number, the stronger the encryption.
Your options are:
|
For international users, key strength
is 512.
|
Key Label | The name that identifies the private key/certificate. | Required field. The label must be unique among all labels used for certificates. |
Common Name | This could be your first and last name or name of a university or EAServer host name. | Required field. |
User ID | Any user ID that would further identify you. | |
Organization | The name of your company, university, or other organization. | Required field. |
Organization Unit | The name of a department within your organization. | |
Locality | The location of your organization. | You must supply at least
one of:
|
State/Province | The name of your state or province. | |
Country | Your two-digit country code; for example, "U.S." | |
Requester Name | The person requesting the certificate. | |
Server Admin | The name, if any, of the server administrator. | |
Your e-mail address. | ||
Server Certificate Request | Displays the request information along with the generated public key. | Depending on the CA, you might be able to copy and paste the certificate request from this window into an e-mail and forward it for signing. |
Save to File | Select this option and enter
the full path name to save the generated certificate request as
a text file.
You can also use the browse feature to locate and save the file. |
If you do not immediately send the certificate request to be signed, save the certificate request to a file and send it for signature later. |
Cut and Paste the Certificate | If available, paste the signed certificate in this window for installation. | If you do not install the signed certificate now, you can use the Install Certificate option when you receive your signed certificate. |
Format Type | Identifies the format of the certificate request. Your options are "base64" or "binary." | For server certificates, you would normally use a base64 format. |
Mark Private Key Exportable | Check this box to allow the export of this certificate along with its private key. | See "Installing and exporting certificates" for more information.
If checked, you can later uncheck this property. Once unchecked, you cannot change this property. If unchecked, you cannot export this certificate and private key. |
When installing or exporting a certificate, Security Manager determines the type of certificate based on the file extension. The extensions and the type of certificates they represent are:
Installing and exporting certificates
Security Manager allows you to export or import (install):
Installing a certificate
Once installed, you can assign a user certificate to a security profile. For more information, see "Configuring security profiles".
After installing a signer's certificate, mark it as trusted if you want to accept certificates signed by that signer. See "Viewing certificate, trust, and export information" for more information.
Exporting a certificate
The advanced screen allows you to modify the PKCS #12 options listed below. The default settings are appropriate in most cases and should only be modified by experienced users:
Viewing certificate, trust, and export information
You can view the information about the certificates that you have installed and your own certificates, including identifying, trust, and usage information. To view certificate information:
The Certificate Information dialog appears. Use the scroll bar to view all of the information.
The Certificate dialog includes a Trusted Certificate check box. Based on the policies of your organization, trustworthiness of the certificate signer, and other considerations, specify whether or not to mark a certificate as trusted. Only CA certificates can be marked as trusted or untrusted.
Certificates that are marked as trusted display when you select the Trusted folder.
For user certificates, an Exportable Private Key check box is provided. If this box is checked, you can export the certificate, along with its private key. To prevent future exports, you can uncheck the box. Once unchecked, the private key can never be exported. See "Installing and exporting certificates" for more information.
Verifying a certificate
Security Manager verifies the signature, expiration date, and validity of a certificate. If the certificate is part of a chain of certificates, it verifies each certificate in the chain.
A chain involves more than one certificate. Each certificate in the chain is signed by the preceding certificate. For the certificate to be verified, the entire chain must be verified. If a peer offers a certificate for authentication that belongs to a chain, at least one CA within the chain must be trusted for the certificate to be accepted.
To verify a certificate:
A dialog appears that either verifies the certificate or informs you that verification was unsuccessful. Do not use certificates that fail verification.
Renaming a certificate
Only the label of the certificate is changed. The content of the certificate remains the same.
Deleting a certificate and its associated private key
Security Manager allows you to delete your own certificates and associated private keys, the test CA, and certificates that you have obtained from others.
If you delete the test CA, certificates that were signed by the test CA are no longer useful. In this case, you need to generate a new test CA and new certificates signed by the new test CA to test your security scenarios.
Copyright © 2002 Sybase, Inc. All rights reserved. |