Part 3: EJBCA Administration
The following sections cover administrating EJBCA and include instructions on how to create a 3-tier CA hierarchy, add custom certificate extensions, and how to create certificate profiles, end entities, and administrator roles.
Step 3 - Create User and Computer Auto Enrollment Certificate Profiles
Step 4 - Create Tomcat Server and Web Services API Certificate Profiles
Step 5 - Create User and Computer Auto Enrollment End Entity Profiles
Step 6 - Create Tomcat Server and Web Services API End Entity Profiles
In the examples below, the Certificate Services hostname is csserver.yourcompany.com. The text enclosed in angle brackets should be replaced with names in your environment.
Step 1 - Create 3-tier CA Hierarchy
The following sections cover how to create a 3-tier CA (Root CA, Intermediate CA, and Issuing CA) using soft keystores.
Create Root CA
Follow the steps below to create a Root CA Crypto Token, a Root CA Certificate Profile, and then the Root CA certificate.
Create Root CA Crypto Token
To create Crypto Tokens for the Root CA:
In EJBCA, select Crypto Tokens under CA Functions, and then click Create new.
Specify the following on the New Crypto Token page and click Save.
Name: As name for the Crypto Token, specify "Root CA Token".
Type=Soft.
Authentication Code: Enter a password for the token.
Auto-activation: Clear Use.
Create three key pairs within the Crypto Token:
Generate a signKey of size RSA 4096, used for cert signing.
Generate a defaultKey of size RSA 4096, used for everything not signing or test.
Generate a testKey of size RSA 1024, used for testing.
Create Root CA Certificate Profile
To create a Root CA Certificate Profile:
Click Certificate Profiles under CA Functions.
Clone the ROOTCA profile to create your own profile for the Root CA:
Click Clone next to the ROOTCA profile.
Specify "Root CA Certificate Profile" and click Create from template.
Click Edit on the new Root CA Certificate Profile and specify the following:
Available key algorithms: RSA.
Available bit lengths: 4096.
Validity: 25y.
LDAP DN order: Clear (to get X509 DN ordering) for greater compatibility with systems that use certificates.
Available CAs: Any CA.
Click Save to save the Root CA Profile.
Create Root CA Certificate
To create a Root CA Certificate:
Click Certificate Authorities under CA Functions.
In the Add CA field, enter the name "Root CA" and click Create.
On the Create CA page, specify the following and then click Create:
Signing Algorithm: SHA256WithRSA.
Crypto Token: Root CA Token.
Subject DN: <RootCASubjectDN>.
Signed By: Self Signed.
Certificate Profile: Root CA Certificate Profile.
Validity: 25y.
CRL Distribution Point: <http://crl.yourcompany.com/Root_CA.crl>.
OCSP Service Locator URI: <http://yourocsp.company.com>.
Create Intermediate CA
Follow the steps below to create an Intermediate CA Crypto Token, an Intermediate CA Certificate Profile, and then an Intermediate CA certificate.
Create Intermediate CA Crypto Token
To create an Intermediate CA Crypto Token:
In EJBCA, select Crypto Tokens under CA Functions, and then click Create new.
Specify the following on the New Crypto Token page and click Save.
Name: As name for the Crypto Token, specify "Intermediate CA Token".
Type=Soft.
Authentication Code: Enter a password for the token.
Auto-activation: Clear Use.
Create three key pairs within the Crypto Token:
Generate a signKey of size RSA 4096, used for cert signing.
Generate a defaultKey of size RSA 4096, used for everything not signing or test.
Generate a testKey of size RSA 1024, used for testing.
Create Intermediate CA Certificate Profile
To create an Intermediate CA Certificate Profile:
Click Certificate Profiles under CA Functions.
Clone the SUBCA profile to create your own profile for the Intermediate CA:
Click Clone next to the SUBCA profile.
Specify "Intermediate CA Certificate Profile" and click Create from template.
Click Edit on the new Intermediate CA Certificate Profile and specify the following:
Available key algorithms: RSA.
Available bit lengths: 4096.
Validity: 20y.
LDAP DN order: Clear (to get X509 DN ordering) for greater compatibility with systems that use certificates.
Available CAs: Root CA.
Click Save to save the Intermediate CA Certificate Profile.
Create Intermediate CA Certificate
To create an Intermediate CA Certificate:
Click Certificate Authorities under CA Functions.
In the Add CA field, enter the name "Intermediate CA" and click Create.
On the Create CA page, specify the following and then click Create:
Signing Algorithm: SHA256WithRSA.
Crypto Token: Intermediate CA Token.
Subject DN: <IntermediateCASubjectDN>.
Signed By: Root CA.
Certificate Profile: Intermediate CA Certificate Profile.
Validity: 20y.
CRL Distribution Point: <http://crl.yourcompany.com/Intermediate_CA.crl>.
OCSP Service Locator URI: <http://ocsp.yourcompany.com>.
Create Issuing CA
Create Issuing CA Crypto Token
To create an Issuing CA Crypto Token:
In EJBCA, select Crypto Tokens under CA Functions, and then click Create new.
Specify the following on the New Crypto Token page and click Save.
Name: As name for the Crypto Token, specify "Issuing CA Token".
Type=Soft.
Authentication Code: Enter a password for the token.
Auto-activation: Clear Use.
Create three key pairs within the Crypto Token:
Generate a signKey of size RSA 4096, used for cert signing.
Generate a defaultKey of size RSA 4096, used for everything not signing or test.
Generate a testKey of size RSA 1024, used for testing.
Create Issuing CA Certificate Profile
To create an Issuing CA Certificate Profile:
Click Certificate Profiles under CA Functions.
Clone the SUBCA profile to create your own profile for the Issuing CA:
Click Clone next to the SUBCA profile.
Specify "Issuing CA Certificate Profile" and click Create from template.
Click Edit on the new Issuing CA Certificate Profile and specify the following:
Available key algorithms: RSA.
Available bit lengths: 4096.
Validity: 15y.
LDAP DN order: Clear (to get X509 DN ordering) for greater compatibility with systems that use certificates.
Available CAs: Intermediate CA.
Click Save to save the Issuing CA Certificate Profile.
Create Issuing CA Certificate
To create an Issuing CA Certificate:
Click Certificate Authorities under CA Functions.
In the Add CA field, enter the name "Issuing CA" and click Create.
On the Create CA page, specify the following and then click Create:
Signing Algorithm: SHA256WithRSA.
Crypto Token: Issuing CA Token.
Subject DN: <IssuingCASubjectDN>.
Signed By: Intermediate CA.
Certificate Profile: Issuing CA Certificate Profile.
Validity: 15y.
CRL Distribution Point: <http://crl.yourcompany.com/Issuing_CA.crl>.
OCSP Service Locator URI: <http://ocsp.yourcompany.com>.
Step 2 - Create Custom Certificate Extensions
To create the custom extension for the Microsoft template information, do the following:
In EJBCA, click System Configuration.
Select the Custom Certificate Extensions tab and specify the following:
Object Identifier (OID): "1.3.6.1.4.1.311.21.7".
Label: "Certificate Template Information".
Click Add.
Click Edit on the added object and specify the following:
Select the Encoding = DEROBJECT
Set Dynamic to true.
Click Save.
Step 3 - Create User and Computer Auto Enrollment Certificate Profiles
The following describes how to create user and computer profiles for Auto Enrollment.
Create Certificate Profile for User Auto Enrollment
To create a certificate profile for User Auto Enrollment:
Click Certificate Profiles under CA Functions.
Clone the ENDUSER profile to create your own profile for the Intermediate CA:
Click Clone next to the ENDUSER profile.
Specify "User_Certificate_Profile" and click Create from template.
Click Edit on the new User_Certificate_Profile and specify the following:
Key Usage: Digital Signature, Non-repudiation, and Key encipherment.
Extended Key Usage: Client Authentication, Email Protection, and MS Encrypted File System (EFS).
Used Custom Certificate Extensions: Certificate Template Information.
Available CAs: Issuing CA.
Click Save to save the Certificate Profile.
Create Certificate Profile for Computer Auto Enrollment
To create a certificate profile for Computer Auto Enrollment:
Click Certificate Profiles under CA Functions.
Clone the ENDUSER profile to create your own profile for the Intermediate CA:
Click Clone next to the ENDUSER profile.
Specify "Computer_Certificate_Profile" and click Create from template.
Click Edit on the new Computer_Certificate_Profile and specify the following:
Key Usage: Digital Signature and Key encipherment.
Extended Key Usage: Client Authentication and Server Authentication.
Used Custom Certificate Extensions: Certificate Template Information.
Available CAs: Issuing CA.
Click Save to save the Certificate Profile.
Step 4 - Create Tomcat Server and Web Services API Certificate Profiles
The following sections cover how to create certificate profiles for the Tomcat server and the Web Services API client.
Create Certificate Profile for Tomcat Server
To create a certificate profile for the Tomcat server:
Click Certificate Profiles under CA Functions.
Clone the SERVER profile to create your own profile for the Intermediate CA:
Click Clone next to the SERVER profile.
Specify "Tomcat_Server_Certificate_Profile" and click Create from template.
Click Edit for the new Tomcat_Server_Certificate_Profile and specify the following:
Available key algorithms: RSA.
Available bit lengths: 2048 bits.
Validity: 5y.
CRL Distribution Points: Use.
Use CA defined CRL Dist. Point: Use.
Authority Information Access: Use.
Use CA defined OCSP locator: Use.
Available CAs: Issuing CA.
Click Save to save the Tomcat server Certificate Profile.
Create Certificate Profile for Web Services API client
To create a certificate profile for Web Services API client:
Click Certificate Profiles under CA Functions.
Clone the ENDUSER profile to create your own profile for the Intermediate CA:
Click Clone next to the ENDUSER profile.
Specify "WebService_Client_Certificate_Profile" and click Create from template.
Click Edit for the new WebService_Client_Certificate_Profile and specify the following:
Available key algorithms: RSA.
Available bit lengths: 2048 bits.
Validity: 5y.
Available CAs: ManagementCA.
Click Save to save the Web Services API client Certificate Profile.
Step 5 - Create User and Computer Auto Enrollment End Entity Profiles
The following describes how to create User and Computer Auto Enrollment End Entity Profiles.
Create End Entity Profile for User Auto Enrollment
To create an End Entity Profile for User Auto Enrollment:
Click End Entity Profiles under RA Functions.
In the Add Profile field, specify User_End_Entity_Profile and click Add.
Select the User_End_Entity_Profile, click Edit End Entity Profile, and specify the following:
Subject DN Attributes: CN.
Subject Alternative Name: MS UPN, User Principal Name.
Default Certificate Profile: User_Certificate_Profile.
Available Certificate Profiles: User_Certificate_Profile.
Default CA: Issuing CA.
Available CAs: Issuing CA.
Default Token: User Generated.
Available Tokens: User Generated.
Click Save to store the end entity profile.
Create End Entity Profile for Computer Auto Enrollment
To create an End Entity Profile for Computer Auto Enrollment:
Click End Entity Profiles under RA Functions.
In the Add Profile field, specify Computer_End_Entity_Profile and click Add.
Select the Computer_End_Entity_Profile, click Edit End Entity Profile, and specify the following:
Subject DN Attributes: CN.
Subject Alternative Name: DNS Name.
Default Certificate Profile: Computer_Certificate_Profile.
Available Certificate Profiles: Computer_Certificate_Profile.
Default CA: Issuing CA.
Available CAs: Issuing CA.
Default Token: User Generated.
Available Tokens: User Generated.
Click Save to store the end entity profile.
Step 6 - Create Tomcat Server and Web Services API End Entity Profiles
Create End Entity Profile for SSL Server Certificate
To create an End Entity Profile for the SSL server certificate:
Click End Entity Profiles under RA Functions.
In the Add Profile field, specify TomcatServerEEProfile and click Add.
Select the TomcatServerEEProfile, click Edit End Entity Profile, and specify the following:
End Entity E-mail: Clear.
Subject DN Attributes: CN.
Subject Alternative Name: DNS Name.
Default Certificate Profile: Tomcat_Server_Certificate_Profile.
Available Certificate Profiles: Tomcat_Server_Certificate_Profile.
Default CA: Issuing CA.
Available CAs: Issuing CA.
Default Token: JKS.
Available Tokens: JKS.
Click Save to store the end entity profile.
Create End Entity Profile for Web Services Client
To create an End Entity Profile for the Web Services Client:
Click End Entity Profiles under RA Functions.
In the Add Profile field, specify WebServiceClientEEProfile and click Add.
Select the WebServiceClientEEProfile, click Edit End Entity Profile, and specify the following:
End Entity E-mail: Clear.
Subject DN Attributes: CN.
Default Certificate Profile: WebService_Client_Certificate_Profile.
Available Certificate Profiles: WebService_Client_Certificate_Profile.
Default CA: ManagementCA.
Available CAs: ManagementCA.
Default Token: JKS.
Available Tokens: JKS.
Click Save to store the end entity profile.
Step 7 - Create Tomcat and Web Services End Entities
Create and Download Tomcat JKS Keystore
Create and download the Tomcat JKS Keystore according to the following steps and replace the text enclosed in angle brackets with the values used in your environment.
Click Add End Entity under RA Functions and specify the following:
End Entity Profile: TomcatServerEEProfile
Username: tomcat_server.
Password: <PASSWORD>.
Confirm Password: <PASSWORD>.
CN: <tomcatserver.yourcompany.com>.
DNS Name: <tomcatserver.yourcompany.com>.
Click Add.
Select Public Web, click Create Keystore and specify the following:
Username: tomcat_server.
Password: <PASSWORD>.
Click OK.
Click Enroll and save the keystore as tomcat_server.jks.
Create and Download Web Services JKS Keystore
To create and download the Web Services JKS Keystore:
Click Add End Entity under RA Functions and specify the following:
End Entity Profile: WebServiceClientEEProfile
Username: aewsclient.
Password: <PASSWORD>
Confirm Password: <PASSWORD>
CN: aewsclient.
Click Add.
Select Public Web, click Create Keystore and specify the following:
Username: aewsclient.
Password: <PASSWORD>
Click OK.
Click Enroll and save the keystore as aewsclient.jks.
Step 8 - Create Administrator Roles for Web Services Client
To create administrator roles for the Web Services client, do the following:
Click System Functions > Administrator Roles.
Click Add and specify the name for the role: AutoEnrollment Web Services.
Click on Members for AutoEnrollment Web Services and specify the following:
Match with: X509: CN, Common Name.
CA: ManagementCA.
Match value: aewsclient.
Click Add.
Click Edit Access Rules for AutoEnrollment Web Services and specify the following:
Role Template: RA Administrators.
Authorized CA: Issuing CA.
End Entity Rules: Create End Entities, Delete End Entities, Edit End Entities, and View End Entities.
End Entity Profiles: Computer_End_Entity_Profile and User_End_Entity_Profile (select other End Entity Profiles that will be used with Auto Enrollment, if any).
Other Rules: Clear View Audit Log.
Click Save.