PKI Subsystem Configuration

From Dogtag
Revision as of 03:35, 26 February 2008 by Mharmsen (talk | contribs) (CA)

Jump to: navigation, search

PKI Subsystem Configuration

CA

Configuration of this PKI subsystem can be accomplished in one of three ways:

(1) The configuration URL is present on the screen. When this occurs, something similar to the following should appear on the screen:

   PKI instance creation Utility ...
   
   
   PKI instance creation completed ...
   
   Starting pki-ca:          [  OK  ]
   
   PKI service(s) are available at https://<fully qualified domain name>:<secure ca port>
   
   Server can be operated with /etc/init.d/pki-ca start | stop | restart
   
   Please start the configuration by accessing:
   http://<fully qualified domain name>:<ca port>/ca/admin/console/config/login?pin=2yTKpsg1GupESw4tYYOv
    NOTE:   Default secure ca port:   9443
      Default ca port: 9080

    Invoke a browser, insert the configuration URL, and follow the step-by-step instructions displayed in each panel.

    IMPORTANT:   When finished, don't forget to restart this PKI instance!

(2) If the user no longer has access to the configuration URL displayed on the screen, one can find the configuration URL at the end of the /var/log/<instance name>-install.log. For example:

   .
   .
   .
   [2008-02-22 18:20:00] [log] Configuration Wizard listening on
   http://<fully qualified domain name>:<ca port>/ca/admin/console/config/login?pin=2yTKpsg1GupESw4tYYOv
    NOTE:   The pin is also stored in the /etc/<instance name>/CS.cfg file as the preop.pin parameter.
      The ca port is also stored in the /etc/<instance name>/server.xml file as the first uncommented "non-SSL HTTP/1.1 Connector" Connector port parameter.

    Invoke a browser, insert the configuration URL, and follow the step-by-step instructions displayed in each panel.

    IMPORTANT:   When finished, don't forget to restart this PKI instance!

(3) PKI subsystems can also be configured "automatically" by creating and using the pkisilent component with a predefined profile.

DRM

Configuration of this PKI subsystem can be accomplished in one of three ways:

(1) The configuration URL is present on the screen. When this occurs, something similar to the following should appear on the screen:

   PKI instance creation Utility ...
   
   
   PKI instance creation completed ...
   
   Starting pki-kra:          [  OK  ]
   
   PKI service(s) are available at https://<fully qualified domain name>:<secure drm port>
   
   Server can be operated with /etc/init.d/pki-kra start | stop | restart
   
   Please start the configuration by accessing:
   http://<fully qualified domain name>:<drm port>/kra/admin/console/config/login?pin=4GW0J9AE529VcwUEulBU
    NOTE:   Default secure drm port:   10443
      Default drm port: 10080

    Invoke a browser, insert the configuration URL, and follow the step-by-step instructions displayed in each panel.

(2) If the user no longer has access to the configuration URL displayed on the screen, one can find the configuration URL at the end of the /var/log/<instance name>-install.log. For example:

   .
   .
   .
   [2008-02-22 18:21:00] [log] Configuration Wizard listening on
   http://<fully qualified domain name>:<drm port>/kra/admin/console/config/login?pin=4GW0J9AE529VcwUEulBU
    NOTE:   The pin is also stored in the /etc/<instance name>/CS.cfg file as the preop.pin parameter.
      The drm port is also stored in the /etc/<instance name>/server.xml file as the first uncommented "non-SSL HTTP/1.1 Connector" Connector port parameter.

    Invoke a browser, insert the configuration URL, and follow the step-by-step instructions displayed in each panel.

(3) PKI subsystems can also be configured "automatically" by creating and using the pkisilent component with a predefined profile.

OCSP

Configuration of this PKI subsystem can be accomplished in one of three ways:

(1) The configuration URL is present on the screen. When this occurs, something similar to the following should appear on the screen:

   PKI instance creation Utility ...
   
   
   PKI instance creation completed ...
   
   Starting pki-ocsp:          [  OK  ]
   
   PKI service(s) are available at https://<fully qualified domain name>:<secure ocsp port>
   
   Server can be operated with /etc/init.d/pki-ocsp start | stop | restart
   
   Please start the configuration by accessing:
   http://<fully qualified domain name>:<ocsp port>/ocsp/admin/console/config/login?pin=ceUqWDSnuDGd6hHj52TY
    NOTE:   Default secure ocsp port:   11443
      Default ocsp port: 11080

    Invoke a browser, insert the configuration URL, and follow the step-by-step instructions displayed in each panel.

(2) If the user no longer has access to the configuration URL displayed on the screen, one can find the configuration URL at the end of the /var/log/<instance name>-install.log. For example:

   .
   .
   .
   [2008-02-22 18:21:55] [log] Configuration Wizard listening on
   http://<fully qualified domain name>:<ocsp port>/ocsp/admin/console/config/login?pin=ceUqWDSnuDGd6hHj52TY
    NOTE:   The pin is also stored in the /etc/<instance name>/CS.cfg file as the preop.pin parameter.
      The ocsp port is also stored in the /etc/<instance name>/server.xml file as the first uncommented "non-SSL HTTP/1.1 Connector" Connector port parameter.

    Invoke a browser, insert the configuration URL, and follow the step-by-step instructions displayed in each panel.

(3) PKI subsystems can also be configured "automatically" by creating and using the pkisilent component with a predefined profile.

RA

Configuration of this PKI subsystem can be accomplished in one of three ways:

(1) The configuration URL is present on the screen. When this occurs, something similar to the following should appear on the screen:

   PKI instance creation Utility ...
   
   
   PKI instance creation completed ...
   
   Starting pki-ra:                                        [  OK  ]
   
   PKI service(s) are available at https://<fully qualified domain name>:<secure ra port>
   
   Server can be operated with /etc/init.d/pki-ra start | stop | restart
   
   Please start the configuration by accessing:
   http://<fully qualified domain name>:<ra port>/ra/admin/console/config/login?pin=ZvgA642EXN9R8NX2JqDK
    NOTE:   Default secure ra port:   12889
      Default ra port: 12888

    Invoke a browser, insert the configuration URL, and follow the step-by-step instructions displayed in each panel.

(2) If the user no longer has access to the configuration URL displayed on the screen, one can find the configuration URL at the end of the /var/log/<instance name>-install.log. For example:

   .
   .
   .
   [2008-02-22 18:23:49] [log] Configuration Wizard listening on
   http://<fully qualified domain name>:<ra port>/ra/admin/console/config/login?pin=ZvgA642EXN9R8NX2JqDK
    NOTE:   The pin is also stored in the /etc/<instance name>/CS.cfg file as the preop.pin parameter.
      The ra port is also stored in the /etc/<instance name>/server.xml file as the first uncommented "non-SSL HTTP/1.1 Connector" Connector port parameter.

    Invoke a browser, insert the configuration URL, and follow the step-by-step instructions displayed in each panel.

(3) PKI subsystems can also be configured "automatically" by creating and using the pkisilent component with a predefined profile.


TKS

Configuration of this PKI subsystem can be accomplished in one of three ways:

(1) The configuration URL is present on the screen. When this occurs, something similar to the following should appear on the screen:

   PKI instance creation Utility ...
   
   
   PKI instance creation completed ...
   
   Starting pki-tks:          [  OK  ]
   
   PKI service(s) are available at https://<fully qualified domain name>:<secure tks port>
   
   Server can be operated with /etc/init.d/pki-tks start | stop | restart
   
   Please start the configuration by accessing:
   http:/<fully qualified domain name>:<tks port>//tks/admin/console/config/login?pin=ki0R7vMRR75NoIhBrxmf
    NOTE:   Default secure tks port:   13443
      Default tks port: 13080

    Invoke a browser, insert the configuration URL, and follow the step-by-step instructions displayed in each panel.

(2) If the user no longer has access to the configuration URL displayed on the screen, one can find the configuration URL at the end of the /var/log/<instance name>-install.log. For example:

   .
   .
   .
   [2008-02-22 18:22:46] [log] Configuration Wizard listening on
   http:/<fully qualified domain name>:<tks port>//tks/admin/console/config/login?pin=ki0R7vMRR75NoIhBrxmf
    NOTE:   The pin is also stored in the /etc/<instance name>/CS.cfg file as the preop.pin parameter.
      The tks port is also stored in the /etc/<instance name>/server.xml file as the first uncommented "non-SSL HTTP/1.1 Connector" Connector port parameter.

    Invoke a browser, insert the configuration URL, and follow the step-by-step instructions displayed in each panel.

(3) PKI subsystems can also be configured "automatically" by creating and using the pkisilent component with a predefined profile.

TPS

Configuration of this PKI subsystem can be accomplished in one of three ways:

(1) The configuration URL is present on the screen. When this occurs, something similar to the following should appear on the screen:

   PKI instance creation Utility ...
   
   
   PKI instance creation completed ...
   
   Starting pki-tps:                                        [  OK  ]
   
   PKI service(s) are available at https://<fully qualified domain name>:<secure tps port>
   
   Server can be operated with /etc/init.d/pki-tps start | stop | restart
   
   Please start the configuration by accessing:
   http://<fully qualified domain name>:<tps port>/tps/admin/console/config/login?pin=X4PRHsoagBcuNUGeneUM
    NOTE:   Default secure tps port:   7889
      Default tps port: 7888

    Invoke a browser, insert the configuration URL, and follow the step-by-step instructions displayed in each panel.

(2) If the user no longer has access to the configuration URL displayed on the screen, one can find the configuration URL at the end of the /var/log/<instance name>-install.log. For example:

   .
   .
   .
   [2008-02-22 18:27:58] [log] Configuration Wizard listening on
   http://<fully qualified domain name>:<tps port>/tps/admin/console/config/login?pin=X4PRHsoagBcuNUGeneUM
    NOTE:   The pin is also stored in the /etc/<instance name>/CS.cfg file as the preop.pin parameter.
      The tps port is also stored in the /etc/<instance name>/server.xml file as the first uncommented "non-SSL HTTP/1.1 Connector" Connector port parameter.

    Invoke a browser, insert the configuration URL, and follow the step-by-step instructions displayed in each panel.

(3) PKI subsystems can also be configured "automatically" by creating and using the pkisilent component with a predefined profile.