Lexmark MS818 Embedded Web Server Administrator s Guide - Page 82

Appendix A: CA file creation, Appendix B: CA, Signed Device Certificate creation, Appendix C:

Page 82 highlights

Appendix 82 Appendix Appendix A: CA file creation Note: This example of generation of a CA file for the Certificate Authority assumes usage of a Windows Certificate Authority server. 1 Point the browser window to the CA. Make sure to use the URL, http//

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98

Appendix
Appendix A: CA file creation
Note:
This example of generation of a CA file for the Certificate Authority assumes usage of a Windows
Certificate Authority server.
1
Point the browser window to the CA. Make sure to use the URL, http//<CA’s address>/CertSrv, where
CA’s
address
is the IP address or host name of the CA server.
Note:
Before the CA Web page opens, a Windows login window may pop up and request user
credentials to verify that you have access to the CA Web page.
2
Click
Download a CA certificate, certificate chain, or CRL
.
3
Click
Base 64 encoded
, and then click
Download CA Certificate
.
Note:
DER encoding is not supported.
4
Save the certificate that is offered in a file. The file name is arbitrary, but the extension should be “.pem”.
Appendix B: CA
Signed Device Certificate creation
Note:
This example of generation of a CA file for the Certificate Authority assumes usage of a Windows
Certificate Authority server.
1
Point the browser window to the CA. Make sure to use the URL, http//<CA’s address>/CertSrv, where
CA’s
address
is the IP address or host name of the CA server.
2
Click
Request a certificate
.
3
Click
advanced certificate request
.
4
Click
Submit a certificate request by using a base
64
encoded
.
5
Paste the (.csr prompted) information copied from the device into the Saved Request field, and then select
a Web Server
type certificate template.
6
Click
Submit
.
Note:
The server takes a moment or two to process the request, and then presents a dialog window.
7
Select
Base 64 encoded
, and then click
Download Certificate
.
Note:
DER encoding is not supported.
8
Save the certificate that is offered in a file. The file name is arbitrary, but the extension should be “.pem”.
Appendix C: Automatic Certificate Enrollment application
This application, after installation, will automatically create a device certificate signing request and pass the
signing request on to the Certificate Authority (CA) for approval. The CA signed device certificate is then
retrieved and installed on the printer. This quick and simple process replaces the previous manual process.
For this application to function, the device must be joined to an Active Directory environment. A Certificate
Enrollment Web Services (Server Role) application also needs to be installed on the customer network.
Appendix
82