Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: New article for IDM 5.0.1.

Comment: New article

Info

This article is new for Smart ID Identity Manager 245.0.R11.

Bootstrapping of the sign and encrypt engine must be done before the system is used for the first time. Bootstrapping of production systems involve use of various certificate authorities to generate keys and issue certificates used by Identity Manager.

Most descriptors, such as EncryptedFields and ObjectHistorySigner, always require proper bootstrapping for secure operation. Depending on the subset of Identity Manager features to be used, certain descriptors may be configured with placeholder keys and certificates, for example, SignEmailDescriptor, if E-Mail email signing in Identity Manager is not enabled.

...

If Identity Manager has already been used with test certificates, the insecure certificates have probably been used. Object history entries and secrets were likely created with the demo keys and any exported configurations may have been signed and encrypted with the demo keys too. In this casewithout proper bootstrapping, the system must be bootstrapped again as described in this article. After the bootstrapping:

...

The first step is to go through the list of all descriptors and fill out the table for all the descriptors.

...

Detailed overview to identify requirements

Requirement type

Comment

More detail

Setup

Is this descriptor required in your installation? Most descriptors are required. A few are only required if you use the feature they support.

In the list of descriptors, see use case.

Placeholder

Are you going to use a placeholder? If a descriptor is required but you do not need its use case, use a placeholder with some dummy certificate.

In the list of descriptors, see use case.

HSM

Where will you store the keys and/or certificates? Most keys and/or certificates can be stored in an HSM. An HSM is more secure than a file.

In the list of descriptors, see storage.

Key type or size

Are you using RSA or ECC? What key size?

In the list of descriptors, see key requirements.

Validity

-

In the list of descriptors, see certificate requirements.

Trusted by

Who needs to trust the certificate? You may need to install the certificate or the issuer’s certificate to a machine.

In the list of descriptors, see general requirements and certificate requirements.

Issuer

Who will issue this certificate? This will depend on who needs to trust it. You can use more than one CA. The choices are:

  • any CA, for example, your own SmartID Certificate Manager or a public CA.

  • a trusted S/MIME CA. This is needed in case you want Identity Manager to sign emails, otherwise clients may fail to validate the emails.

  • for placeholders or certificates that do not require trust, you can create your own keypairs and certificates with any suitable tool you like.

In the list of descriptors, see certificate requirements.

Request certificates

For all the required descriptors, generate keypairs and Certification Signing Requests (CSRs) and request the certificates or create your own. If you want to store the keys in a Hardware Security Module (HSM), which is highly recommended, use it for generating keypairs.

...