Configuring Failover Support
165
The CA configuration parameters are listed in
Table 5.11, “CA Connection Settings”
. The TKS
configuration parameters are listed in
Table 5.12, “TKS Connection Settings”
. The DRM configuration
parameters are listed in
Table 5.13, “DRM Connection Settings”
.
Parameter
Description
conn.ca
#
.hostport
The Certificate Authority hostname and port number. The format is
hostname:port
. This should be the CA's end-entity SSL port.
conn.ca
#
.clientNickname
The client certificate nickname. This certificate is used by the TPS when connecting to the CA. This client certificate should be trusted
by the CA, and the client should be a configured CA agent.
conn.ca
#
.servlet.enrollment
The servlet that performs profile-based certificate enrollment. The value must be
/ca/ee/ca/profileSubmitSSLClient
.
conn.ca
#
.servlet.renewal
The servlet that performs profile-based certificate renewal. The value must be
/ca/ee/ca/profileSubmitSSLClient
.
conn.ca1.servlet.revoke
The servlet that performs certificate revocation; for example,
/ca/subsystem/ca/doRevoke
.
conn.ca1.servlet.unrevoke
The servlet that unrevokes a certificate; for example,
/ca/subsystem/ca/doUnrevoke
.
conn.ca
#
.retryConnect
The number of times the TPS tries to reconnect to the CA if the connection fails. The valid values are integers. For example,
3
.
conn.ca
#
.timeout
The number of seconds before the TPS times out after failing to connect to the CA. For example,
30
.
conn.ca
#
.SSLOn
Sets if SSL needs to be turned on to connect to the CA. This value must be
true
.
conn.ca
#
.keepAlive
Sets whether to keep the connection to the CA alive or terminate it after every operation. The valid values are
true|false
.
Table 5.11. CA Connection Settings
Parameter
Description
conn.tks
#
.hostport
The TKS subsystem hostname and port number. The format is
hostname:port
. This should be the TKS's agent port.
conn.tks
#
.clientNickname
The client certificate nickname to use. This certificate is used by the TPS when connecting to the TKS. This client certificate should
be trusted by the TKS, and the client should be a configured TKS agent.
conn.tks
#
.retryConnect
The number of times the TPS tries to reconnect to the TKS after a connection attempt fails. The valid values are integers. For
example,
3
.
conn.tks
#
.SSLOn
Sets whether SSL needs to be turned on for the connection to the TKS. This value must be
true
.
conn.tks
#
.keepAlive
Sets whether to keep the connection to the TKS alive or terminate it after every operation. The valid values are
true|false
.
conn.tks
#
.serverKeygen
Sets where key generation happens. When set to
true
, key generation happens on the server. When set to
false
, key generation
happens on the smart card.
conn.tks1.servlet.computeSessionKey
The servlet to compute session key for the secure channel; for example,
/tks/agent/tks/computeSessionKey
.
conn.tks1.servlet.createKeySetData
The servlet to create key set data; for example,
/tks/agent/tks/createKeySetData
. This servlet is used for key upgrade.
conn.tks1.servlet.encryptData
The servlet which encrypts data with token's KEK key; for example,
/tks/agent/tks/encryptData
.
Table 5.12. TKS Connection Settings
Parameter
Description
conn.drm
#
.hostport
The DRM subsystem hostname and port number. The format is
hostname:port
This should be the DRM agent port.
conn.drm
#
.clientNickname
The client certificate nickname to use. This certificate is used by TPS when connecting to the DRM. This client certificate should be
trusted by the DRM, and the client should be a configured DRM agent.
conn.drm
#
.retryConnect
The number of times the TPS tries to reconnect to the DRM after a connection attempt fails. The valid values are integers. For
example,
3
.
conn.drm
#
.SSLOn
Sets whether SSL needs to be turned on for the connection to the DRM. This value must be
true
.
conn.drm
#
.keepAlive
Sets whether to keep the connection to the DRM alive or terminate it after every operation. The valid values are
true|false
.
conn.drm1.servlet.GenerateKeyPair
The servlet for handling server-side key pair generation; for example,
/kra/agent/kra/GenerateKeyPair
.
Summary of Contents for CERTIFICATE SYSTEM 8.0 - ADMINISTRATION
Page 42: ...20 ...
Page 43: ...Part I Setting up Certificate Services ...
Page 44: ......
Page 190: ...168 ...
Page 208: ...186 ...
Page 223: ...Part II Additional Configuration to Manage CA Services ...
Page 224: ......
Page 256: ...234 ...
Page 270: ...248 ...
Page 280: ...258 ...
Page 292: ...270 ...
Page 293: ...Part III Managing the Subsystem Instances ...
Page 294: ......
Page 408: ...386 ...
Page 438: ...416 ...
Page 439: ...Part IV References ...
Page 440: ......
Page 503: ...Netscape Defined Certificate Extensions Reference 481 OID 2 16 840 1 113730 13 ...
Page 504: ...482 ...
Page 556: ...534 ...
Page 564: ...542 ...