...
The internal version number of the connector is shown as file- and product version of MSCAConnector.dll.
...
In Smart ID 21.04, the MSCAConnector was released in sync with Identity Manager builds and you can deploy a matching version of the connector for your Identity Manager. Current connector versions can also be used with older Identity Manager releases. If any new release should break backwards-compatibility, it will be noted here.
...
Needs to be a Domain User
Needs to be member of the local group
IIS_USRS
on the IIS ServerNeeds to have the following access in the ADCS CA, see the screenshot below.
Read
Issue and Manage Certificates
Request Certificates
...
Needs to have the following access in the Certificate Templates that Identity Manager will use, see the screenshot below.
Read
Enroll
...
Prepare certificates
Export CA certificates: Export all the CA chain certificates to file, either encoded as DER or Base64. For example, export the Root CA, Intermediate, and Issuing CA. These certificates are needed for later purpose.
Issue a web server certificate with server authentication. This is needed since the ADCS connector must have SSL/TLS enabled.
Issue a Identity Manager Virtual Registration Officer (VRO) certificate: This is needed since when Identity Manager requests a certificate it will authenticate to the connector using a certificate. Set Extended key usage to
Client Authentication
. If needed, create a certificate template in ADCS for this purpose. In the certificate template, set that the Private Key may be exported.Export the Identity Manager VRO certificate and the key to a .PFX file.
...
Unzip the installation package for the ADCS connector, for example in C:\Nexus\connector_adcs:
Create a temp folder in the installation folder of the ADCS connector.
Copy the Identity Manager VRO certificate (not the key) into the folder cert.
Open the file Web.config and edit the following part. Make sure to type the absolute path to the
ClientcertFile
.Example: web.config
Code Block language xml <appSettings> <add key="TempDir" value="C:\Nexus\connector_ADCS\temp\" /> <!-- the loglevel entry is obsolete since IDM 21.04.2 --> <add key="ClientcertFile" value="C:\Nexus\connector_ADCS\cert\prime_officer1_adcs.cer" /> <add key="KraDir" value="C:\Nexus\connector_ADCS\cert\" /> <!-- further settings go here --> </appSettings>
Open the file MSCAConnector.dll.log4net.xml and edit it. It uses standard log4net syntax. Make sure you set the absolute path to the log-file, which has to be writable by the connector/IIS.
MSCAConnector.dll.log4net.xml example
Code Block language xml <?xml version="1.0" encoding="utf-8" ?> <log4net debug="false"> <appender name="LogFileAppender" type="log4net.Appender.FileAppender" > <file value="c:\inetpub\ADCSConnector\logs\MSCAConnector.log" /> <appendToFile value="true" /> <layout type="log4net.Layout.PatternLayout"> <conversionPattern value="(%d) %-5p [%t] (%logger) : %m%n" /> </layout> </appender> <root> <level value="DEBUG" /> <appender-ref ref="LogFileAppender" /> </root> </log4net>
...
You should see this page:
...
Limitations
Supported DN attributes
...