You are viewing an old version of this page. View the current version.
Compare with Current
View Page History
« Previous
Version 5
Next »
This article is valid for Certificate Manager 8.5 and later.
This article describes how to do initial configuration of Protocol Gateway, using the provided enrollment templates file.
This instruction includes configuration of VRO and TLS parameters for connection and communication with the CM server. This is configured in cm-gateway.properties and determines the following:
Prerequisites
The following prerequisites apply:
Step-by-step instruction
Import and adapt standard configuration
Import standard configuration
Nexus provides a template file that includes standard configurations of Protocol Gateway, as well as configurations for the SCEP and CMP protocols.
To import the standard configurations:
- Open Administrator's workbench (AWB).
- Import the enrollmentTemplates.dat file from \CM\clients\web\pgwy\. For more information, see Import items to Certificate Manager.
Configure and sign imported elements
The imported elements are marked with a black and yellow "under construction" bar, since they are not signed yet.
In Administrator's workbench (AWB), open each element and make needed configurations and sign the changes:
- Modify VRO Certificate Procedure:
- Change Issuing CA to the Officer and System CA.
- Click OK and sign the updates. See Sign tasks in Certificate Manager.
- Modify Protocol Gateway RA Certificate Procedure:
- Change Issuing CA to the CA that shall issue certificates to the devices, for example Device Issuing CA.
- Click OK and sign the updates. See Sign tasks in Certificate Manager.
- For each of the following elements, select Modify, click OK and sign the updates. See Sign tasks in Certificate Manager.
- Protocol Gateway RA Token
- VRO Token Procedure
- VRO Officer Profile
Issue Protocol Gateway RA soft token
To issue a Protocol Gateway RA soft token:
- Open Registration Authority (RA) in Certificate Manager.
- Issue a Protocol Gateway RA Soft Token, see Issue software token in Certificate Manager.
In File for Media, select the path and filename where the soft token shall be stored, for example \CM\server\certs\protocol-gateway-ra.p12
- In Procedure, select Protocol Gateway RA Token.
Enter values in Country, Organization and set Common Name to Protocol Gateway RA.
In Signature PIN, enter the PIN for Security officer 1.
In the popup dialog, select a PIN for the soft token.
When the soft token is issued, a popup window is opened where the certificate is shown. Open, select Save to file (DER), and save protocol-gateway-ra.cer as a DER.encoded certificate.
Issue certificate for Protocol Gateway officer
The Protocol Gateway Officer that was imported, needs a certificate. In this example it is issued as a soft token.
To issue a Protocol Gateway Officer soft token:
- Open Registration Authority (RA) in Certificate Manager.
- Issue a Protocol Gateway RA Soft Token, see Issue software token in Certificate Manager.
In File for Media, select the path and filename where the soft token shall be stored, for example \CM\server\certs\protocol-gateway-ra.p12
- In Procedure, select VRO Token Procedure.
Enter values in Country, Organization and set Common Name to Protocol Gateway Officer.
In Signature PIN, enter the PIN for Security officer 1.
In the popup dialog, select a PIN for the soft token.
Promote certificate to officer
Connect the new certificate to the Protocol Gateway Officer:
- Open Administrator's workbench (AWB).
- Modify the Protocol Gateway Officer in the Officers tab.
- In Certificate, click the arrow to select. Select the certificate that was just created for the Protocol Gateway Officer.
- Click OK, and then Sign the update. See Sign tasks in Certificate Manager.
Get TLS CA certificate
The CA certificate must be exported to be used in Protocol Gateway to trust the CA.
In Administrator's workbench (AWB),
- Select the Officer and System CA.
- In the menu, select Cross > Export Certificate > Binary.
- Store the certificate as SystemCA.cer.
This certificate shall be used later in the Protocol Gateway configuration.
Copy officer and RA tokens to Protocol Gateway
- Copy the Protocol Gateway Officer token and the Protocol Gateway RA token to the Protocol Gateway \conf folder, for example C:\ProgramData\Nexus\cm-gateway\conf\certdir.
- protocol-gateway-vro.p12
This is needed for Protocol Gateway as a virtual registration officer, when devices request certificates in an automated workflow. - protocol-gateway-ra.p12
This is needed for certain protocols (EST, CMP, CMC and SCEP), for example for Full PKI requests. The specified RA token is used to establish secure transactions with the end entities requesting certificates. For more information on Full PKI Requests, see the CMC specification: RFC 5272 Section 3.2.
Trust CM host
For Protocol Gateway to trust the CM host:
- Copy the TLS CA certificate SystemCA.cer to the \conf\certdir trust store folder, for example C:\ProgramData\Nexus\cm-gateway\conf\certdir.
Set properties in CM-gateway.properties
To set properties for Protocol Gateway:
- Open the file \Nexus\cm-gateway\conf\cm-gateway.properties for editing.
- Modify the following properties:
- Set
cmhost
to your CM host. - Set
officer.keyfile
to the Protocol Gateway Officer token file and officer.password
to the related PIN.
cmhost = localhost
cmconnections = 20
officer.keyfile = PGWYOfficer.p12
officer.password = 1234
Configure TLS Server Name Indication (SNI) parameter
Protocol Gateway supports configuration of the TLS Server Name Indication (SNI) parameter so that the correct server certificate can be obtained by the Protocol Gateway CM client during TLS handshake. This typically applies in cases where the IP hosting the CM server also hosts other services with different host names on the same TLS port, or if the CM server is located behind a proxy or a load balancer. For more information, see RFC 6066.
To use the server name indication feature in Protocol Gateway:
- Open the file C:\ProgramData\Nexus\cm-gateway\conf\cm-gateway.properties for editing.
- Set
ssl.servernameindication
to your CM hostname.
Start service
Start Protocol Gateway Tomcat service
- Start the Protocol Gateway by starting the Tomcat service.
Set up protocols
To enable and configure protocols, see Configuration examples in Protocol Gateway.