McAfee MEJCAE-AM-DA Product Guide - Page 59

Sign public keys with the root certificate, To create an X.509 certificate

Page 59 highlights

Working with X.509 Certificates Issuing X.509 certificates Signed Key ID : 0xD7C74275 (0x03534DC9D7C74275) Name: CN=Root CA, [email protected] Issuer: CN=Root CA, [email protected] Signer Key ID: 0xD7C74275 (0x03534DC9D7C74275) Type: X.509 Exportable: Yes Created: 2001-06-01 Expires: 2002-06-01 Last CRL: N/A Next CRL: N/A Trust Depth: 0 Serial Number: B1B869D7A9A5F08E4EA8 Sign public keys with the root certificate Now that you have a Root CA certificate, you can use it to sign other keys and issue X.509 certificates. By default, E-Business Server uses the key specified by the DEFAULT-KEY parameter in the E-Business Server configuration file as the signing key. If you want to specify a different key for signing the new certificate, use the --sign-with option. If the key you are signing the new certificate with has multiple certificates attached to it, then you must also include the --issuer-dn and --issuer-serial options to uniquely identify the issuing certificate. You do not need to supply these options if there is only one certificate on the signing key. See Specifying a certificate with the issuer's name and serial number on page 50 for more information. Optionally, you can add certificate attributes using the --cert-attribute modifier to the new certificate you are creating. For more information on how to specify a certificate attribute, see Specifying certificate attributes on page 51. By default, an X.509 certificate is valid for one year from the certificate's creation date. When issuing an X.509 certificate, use the --start-date modifier to specify a future date as the beginning of the validity period and use the --expires-after modifier to specify the number of days you want the certificate to remain valid or a future date when the certificate will expire. Enter the start and end dates in YYYY-MM-DD format. To create an X.509 certificate: Use the following syntax: ebs --key-sign --x509 [--sign-with ] [--issuer-dn [--issuer-serial ]] [--cert-attribute ] [--start-date ] [--expires-after ] For example, if the Root CA certificate (OxD7C74275) created in the previous section (see Create a Root CA certificate on page 56) is used to add an X.509 signature to the key belonging to Scott Tibson (0x196DE730), then we might enter the following: ebs --key-sign 0x196DE730 --x509 --sign-with 0xD7C74275 --issuer-dn "CN=Root CA, [email protected], OU=EBS, O=MCAFEE" --issuer-serial B1B869D7A9A5F08E4EA8 --cert-attribute [email protected] --cert-attribute O="McAfee" --cert-attribute OU=EBS An X.509 certificate is created and added to Scott Tibson's key. You can view the X.509 signature by entering the following: ebs --sig-detail 0x196DE730 57 E-Business Server™ 8.6 Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188

57
E-Business Server
8.6
Product Guide
Working with X.509 Certificates
Issuing X.509 certificates
Signed Key ID : 0xD7C74275 (0x03534DC9D7C74275)
Serial Number:
Sign public keys with the root certificate
Now that you have a Root CA certificate, you can use it to sign other keys and issue X.509 certificates.
By default, E-Business Server uses the key specified by the
DEFAULT-KEY
parameter in the E-Business Server
configuration file as the signing key. If you want to specify a different key for signing the new certificate, use
the
--sign-with
option.
If the key you are signing the new certificate with has multiple certificates attached to it, then you must also
include the
--issuer-dn
and
--issuer-serial
options to uniquely identify the issuing certificate. You do not
need to supply these options if there is only one certificate on the signing key. See
Specifying a certificate
with the issuer’s name and serial number
on page 50
for more information.
Optionally, you can add certificate attributes using the
--cert-attribute
modifier to the new certificate you
are creating. For more information on how to specify a certificate attribute, see
Specifying certificate
attributes on page 51
.
By default, an X.509 certificate is valid for one year from the certificate’s creation date. When issuing an
X.509 certificate, use the
--start-date
modifier to specify a future date as the beginning of the validity period
and use the
--expires-after
modifier to specify the number of days you want the certificate to remain valid
or a future date when the certificate will expire. Enter the start and end dates in YYYY-MM-DD format.
To create an X.509 certificate:
Use the following syntax:
ebs --key-sign <keyID_of_key_to_sign> --x509 [--sign-with <keyID>] [--issuer-dn <DN> [--issuer-serial
<number>]] [--cert-attribute <name=value>] [--start-date <date>] [--expires-after <expiration>]
For example, if the Root CA certificate (OxD7C74275) created in the previous section (see
Create a Root CA
certificate
on page 56
) is used to add an X.509 signature to the key belonging to Scott Tibson (0x196DE730),
then we might enter the following:
ebs --key-sign 0x196DE730 --x509 --sign-with 0xD7C74275 --issuer-dn “CN=Root CA,
[email protected], OU=EBS, O=MCAFEE” --issuer-serial B1B869D7A9A5F08E4EA8 --cert-attribute
[email protected] --cert-attribute O=”McAfee” --cert-attribute OU=EBS
An X.509 certificate is created and added to Scott Tibson’s key.
You can view the X.509 signature by entering the following:
ebs --sig-detail 0x196DE730
Name:
CN=Root CA, [email protected]
Issuer:
CN=Root CA, [email protected]
Signer Key ID:
0xD7C74275 (0x03534DC9D7C74275)
Type:
X.509
Exportable:
Yes
Created:
2001-06-01
Expires:
2002-06-01
Last CRL:
N/A
Next CRL:
N/A
Trust Depth:
0
B1B869D7A9A5F08E4EA8