Chapter 12. Editing Configuration in the CS.cfg File
284
ca.sslserver.tokenname=Internal Key Storage Token
12.2.2.6. Settings for Required Subsystems
At a minimum, each subsystem depends on a CA, which means that the CA (and any other required
subsystem) has to be configured in the subsystem's settings. Any connection to another subsystem is
prefaced by
conn.
and then the subsystem type and number.
conn.ca1.clientNickname=subsystemCert cert-pki-tps
conn.ca1.hostadminport=server.example.com:9445
conn.ca1.hostagentport=server.example.com:9444
conn.ca1.hostport=server.example.com:9443
conn.ca1.keepAlive=true
conn.ca1.retryConnect=3
conn.ca1.servlet.enrollment=/ca/ee/ca/profileSubmitSSLClient
conn.ca1.servlet.renewal=/ca/ee/ca/profileSubmitSSLClient
conn.ca1.servlet.revoke=/ca/subsystem/ca/doRevoke
conn.ca1.servlet.unrevoke=/ca/subsystem/ca/doUnrevoke
conn.ca1.timeout=100
12.2.2.7. Database Settings
All of the subsystems except for the RA use an LDAP directory to store their information. This internal
database is configured in the
internaldb
parameters, except for the TPS which configured it in the
tokendb
parameters with a lot of other configuration settings.
internaldb._000=##
internaldb._001=## Internal Database
internaldb._002=##
internaldb.basedn=dc=server.example.com-pki-ca
internaldb.database=server.example.com-pki-ca
internaldb.maxConns=15
internaldb.minConns=3
internaldb.ldapauth.authtype=BasicAuth
internaldb.ldapauth.bindDN=cn=Directory Manager
internaldb.ldapauth.bindPWPrompt=Internal LDAP Database
internaldb.ldapauth.clientCertNickname=
internaldb.ldapconn.host=localhost
internaldb.ldapconn.port=389
internaldb.ldapconn.secureConn=false
internaldb.multipleSuffix.enable=false
12.2.2.8. Settings for PKI Tasks
The
CS.cfg
file is used to configure the PKI tasks for every subsystem. The parameters are different
for every single subsystem, without any overlap.
For example, the DRM has settings for storing and recovering keys
kra.keySplitting=false
kra.noOfRequiredRecoveryAgents=1
Review the
CS.cfg
file for each subsystem to become familiar with its PKI task settings; the
comments in the file are a decent guide for learning what the different parameters are.
• The CA configuration file lists all of the certificate profiles and policy settings, as well as rules for
generating CRLs.
Summary of Contents for CERTIFICATE SYSTEM 8.0 - ADMINISTRATION
Page 42: ...20 ...
Page 43: ...Part I Setting up Certificate Services ...
Page 44: ......
Page 190: ...168 ...
Page 208: ...186 ...
Page 223: ...Part II Additional Configuration to Manage CA Services ...
Page 224: ......
Page 256: ...234 ...
Page 270: ...248 ...
Page 280: ...258 ...
Page 292: ...270 ...
Page 293: ...Part III Managing the Subsystem Instances ...
Page 294: ......
Page 408: ...386 ...
Page 438: ...416 ...
Page 439: ...Part IV References ...
Page 440: ......
Page 503: ...Netscape Defined Certificate Extensions Reference 481 OID 2 16 840 1 113730 13 ...
Page 504: ...482 ...
Page 556: ...534 ...
Page 564: ...542 ...