McAfee MEJCAE-AM-DA Product Guide - Page 57

Sending your certificate request to the CA

Page 57 highlights

Working with X.509 Certificates Exporting an X.509 certificate from your key E-Business Server creates a PEM-encoded block of text representing your certificate request. Once you have created a PKCS #10 certificate request, you must send your request to the CA. For instructions, see Sending your certificate request to the CA on page 55. Sending your certificate request to the CA When manually requesting an X.509 certificate, you must deliver your certificate request to the Certificate Authority. Copy your certificate request, the PEM-encoded block of text, and send it to your Certificate Authority. Typically, you can send this via email or copy it directly to the CA's web-site. This process varies between Certificate Authorities. Manually retrieve your certificate and add it to your key pair You need to manually copy the key block representing your new certificate and add it to your key pair. To retrieve your certificate and add it to your key pair: 1 Go to the CA's web-site and copy the key block for your X.509 certificate and paste it into a file. 2 Add the X.509 certificate to your key by entering the following on the command line: ebs --key-add --x509 Where is the name of the file where you copied the key block. The X.509 digital certificate is added to the key you specified when you created the certificate request. You can verify that the certificate has been added by using the --sig-details option. Exporting an X.509 certificate from your key You can export (copy) an X.509 certificate associated with your key to a file. The certificate you want to export must be uniquely identified using the --issuer-dn and --issuer-serial modifiers on the command line. For more information on identifying the certificate you want to use, see Specifying a certificate with the issuer's name and serial number on page 50. EBS supports exporting PEM, DER (PKCS #7) and PKCS #12 formatted certificates. By default, the key is exported in binary (DER) format. If you add the --armor modifier, PEM-encoded format is used instead. A .crt extension is added to the filename (both with and without --armor specified). Include the --with-private modifier to include the private portion of the key pair you are exporting, so that you can use your key to certify your web browser to remote servers. Both the key pair and the certificate are exported in PKCS #12 format. E-Business Server uses a .pfx extension on the output filename making it easy to import the certificate into Internet Explorer. Caution: The PKCS #12 certificate format encodes a decrypted version of a private key. We recommend using extreme caution when exporting or using PKCS #12 export format. To export an X.509 certificate: Use the following syntax: ebs --key-export --x509 [--with-private] [--issuer-dn [--issuer-serial ] [--output ] For example: ebs --key-export "Cheri Walton" --x509 --with-private --issuer-dn "CN=Root CA, [email protected], OU=EBS, O=MCAFEE" --issuer-serial 2840D4A097CF3E1B4016 --output X509cert E-Business Server copies the certificate that matches both the issuer's DN and the serial number specified to the file X509cert.pfx. 55 E-Business Server™ 8.6 Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188

55
E-Business Server
8.6
Product Guide
Working with X.509 Certificates
Exporting an X.509 certificate from your key
E-Business Server creates a PEM-encoded block of text representing your certificate request. Once you
have created a PKCS #10 certificate request, you must send your request to the CA. For instructions,
see
Sending your certificate request to the CA
on page 55
.
Sending your certificate request to the CA
When manually requesting an X.509 certificate, you must deliver your certificate request to the Certificate
Authority.
Copy your certificate request, the PEM-encoded block of text, and send it to your Certificate Authority.
Typically, you can send this via email or copy it directly to the CA’s web-site. This process varies between
Certificate Authorities.
Manually retrieve your certificate and add it to your key pair
You need to manually copy the key block representing your new certificate and add it to your key pair.
To retrieve your certificate and add it to your key pair:
1
Go to the CA’s web-site and copy the key block for your X.509 certificate and paste it into a file.
2
Add the X.509 certificate to your key by entering the following on the command line:
ebs --key-add <filename> --x509
Where
<filename>
is the name of the file where you copied the key block.
The X.509 digital certificate is added to the key you specified when you created the certificate request.
You can verify that the certificate has been added by using the
--sig-details
option.
Exporting an X.509 certificate from your key
You can export (copy) an X.509 certificate associated with your key to a file. The certificate you want to
export must be uniquely identified using the
--issuer-dn
and
--issuer-serial
modifiers on the command line.
For more information on identifying the certificate you want to use, see
Specifying a certificate with the
issuer’s name and serial number
on page 50
.
EBS supports exporting PEM, DER (PKCS #7) and PKCS #12 formatted certificates.
By default, the key is exported in binary (DER) format. If you add the
--armor
modifier, PEM-encoded format
is used instead. A
.crt
extension is added to the filename (both with and without
--armor
specified).
Include the
--with-private
modifier to include the private portion of the key pair you are exporting, so that
you can use your key to certify your web browser to remote servers. Both the key pair and the certificate
are exported in PKCS #12 format. E-Business Server uses a
.pfx
extension on the output filename making
it easy to import the certificate into Internet Explorer.
Caution:
The PKCS #12 certificate format encodes a decrypted version of a private key. We recommend using extreme
caution when exporting or using PKCS #12 export format.
To export an X.509 certificate:
Use the following syntax:
ebs --key-export <userID> --x509 [--with-private] [--issuer-dn <DN> [--issuer-serial <number>]
[--output <filename>]
For example:
ebs --key-export “Cheri Walton” --x509 --with-private --issuer-dn “CN=Root CA, [email protected],
OU=EBS, O=MCAFEE” --issuer-serial 2840D4A097CF3E1B4016 --output X509cert
E-Business Server copies the certificate that matches both the issuer’s DN and the serial number specified
to the file
X509cert.pfx
.