McAfee EPOCDE-AA-BA Product Guide - Page 59

Uploading server certificates, Enable Certificate Based Authentication

Page 59 highlights

Configuring advanced server settings Authenticating with certificates 7 Task 1 Click Menu | Configuration | Server Settings. 2 Select Certificate Based Authentication and click Edit. 3 Click Browse next to CA certificate for client certificate (P7B, PEM). 4 Navigate to and select the certificate file, then click OK. 5 If you have a Certificate Revoked List (CRL) file, click Browse next to this edit box, navigate to the CRL file, and click OK. 6 Click Save to save all changes. 7 Restart ePolicy Orchestrator to activate certificate authentication. Uploading server certificates Servers require certificates for SSL connections providing increased security than standard HTTP sessions. Before you begin To upload a signed certificate, you must have already received a server certificate from a Certificate Authority (CA). It is possible to create self-signed certificates instead of using externally signed ones, though this carries slightly higher risk. This task can be used to initially configure certificate-based authentication, or modify an existing configuration with an updated certificate. Task For option definitions, click ? in the interface. 1 Click Menu | Configuration | Server Settings. 2 Select Certificate Based Authentication and click Edit. 3 Select Enable Certificate Based Authentication. 4 Click Browse next to CA certificate for client certificate (PKCS7, PEM encoded, DER encoded, or PKCS12 file with extension like .cer, .crt, .pem, .der, .p12, .p7b). Navigate to and select the certificate file and click OK. 5 If you have provided a PKCS12 certificate file, enter a password and alias name as appropriate. 6 If you want to provide a Certificate Revoked List (CRL) file, click Browse next to Certificate Revoked List file (PEM) . Navigate to and select the CRL file and click OK. The CRL file must be in PEM format. 7 Click Save to save all changes. 8 Restart the server to enable the Certificate Based Authentication settings changes. Removing server certificates Server certificates can and should be removed if they are no longer used. Before you begin The server must already be configured for certificate authentication before you can remove server certificates. McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide 59

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328

Task
1
Click
Menu
|
Configuration
|
Server Settings
.
2
Select
Certificate Based Authentication
and click
Edit
.
3
Click
Browse
next to
CA certificate for client certificate (P7B, PEM)
.
4
Navigate to and select the certificate file, then click
OK
.
5
If you have a
Certificate Revoked List
(CRL) file, click
Browse
next to this edit box, navigate to the CRL
file, and click
OK
.
6
Click
Save
to save all changes.
7
Restart ePolicy Orchestrator to activate certificate authentication.
Uploading server certificates
Servers require certificates for SSL connections providing increased security than standard HTTP
sessions.
Before you begin
To upload a signed certificate, you must have already received a server certificate from a
Certificate Authority (CA).
It is possible to create self-signed certificates instead of using externally signed ones, though this
carries slightly higher risk. This task can be used to initially configure certificate-based authentication,
or modify an existing configuration with an updated certificate.
Task
For option definitions, click
?
in the interface.
1
Click
Menu
|
Configuration
|
Server Settings
.
2
Select
Certificate Based Authentication
and click
Edit
.
3
Select
Enable Certificate Based Authentication
.
4
Click
Browse
next to
CA certificate for client certificate (PKCS7, PEM encoded, DER encoded, or PKCS12 file with extension
like .cer, .crt, .pem, .der, .p12, .p7b)
. Navigate to and select the certificate file and click
OK
.
5
If you have provided a PKCS12 certificate file, enter a password and alias name as appropriate.
6
If you want to provide a Certificate Revoked List (CRL) file, click
Browse
next to
Certificate Revoked List
file (PEM)
. Navigate to and select the CRL file and click
OK
.
The CRL file must be in PEM format.
7
Click
Save
to save all changes.
8
Restart the server to enable the Certificate Based Authentication settings changes.
Removing server certificates
Server certificates can and should be removed if they are no longer used.
Before you begin
The server must already be configured for certificate authentication before you can remove
server certificates.
Configuring advanced server settings
Authenticating with certificates
7
McAfee
®
ePolicy Orchestrator
®
4.6.0 Software Product Guide
59