Chapter 2. Making Rules for Issuing Certificates
62
policyset.userCertSet.8.default.class_id=subjectAltNameExtDefaultImpl
policyset.userCertSet.8.default.name=Subject Alt Name Constraint
policyset.userCertSet.8.default.params.subjAltNameExtCritical=false
policyset.userCertSet.8.default.params.subjAltExtType_0=RFC822Name
policyset.userCertSet.8.default.params.subjAltExtPattern_0=$request.requestor_email$
policyset.userCertSet.8.default.params.subjAltExtGNEnable_0=true
This inserts the requester's email as the first CN component in the subject alt name. To use additional
components, increment the
Type_
,
Pattern_
, and
Enable_
values numerically, such as
Type_1
.
Configuring the subject alt name is detailed in
Section B.1.17, “Subject Alternative Name Extension
Default”
, as well.
To insert LDAP components into the subject alt name of the certificate:
1. Inserting LDAP attribute values requires enabling the user directory authentication plug-in,
UidPwdDirAuth
.
a. Open the CA Console.
pkiconsole https://server.example.com:9445/ca
b. Select
Authentication
in the left navigation tree.
c. In the
Authentication Instance
tab, click
Add
, and add an instance of the
UidPwdDirAuth
authentication plug-in.
d. Set the information for the LDAP directory.
e. Set the LDAP attributes to populate.
f.
Save the new plug-in instance.
For information on configuring the LDAP authentication modules, see
Section 9.2.1, “Setting up
Directory-Based Authentication”
.
2. When the new authentication plug-in is added, the corresponding parameters are added to the
CA's
CS.cfg
file. For example, this instance of the
UidPwdDirAuth
plug-in is set to populate the
attribute:
...
auths.instance.UserDirEnrollment.dnpattern=
auths.instance.UserDirEnrollment.ldapByteAttributes=
auths.instance.UserDirEnrollment.ldapStringAttributes=mail
auths.instance.UserDirEnrollment.pluginName=UidPwdDirAuth
auths.instance.UserDirEnrollment.ldap.basedn=dc=example,dc=com
auths.instance.UserDirEnrollment.ldap.maxConns=
auths.instance.UserDirEnrollment.ldap.minConns=
auths.instance.UserDirEnrollment.ldap.ldapconn.host=localhost
auths.instance.UserDirEnrollment.ldap.ldapconn.port=389
auths.instance.UserDirEnrollment.ldap.ldapconn.secureConn=false...
The
ldapStringAttributes
parameter instructs the authentication plug-in to read the value
of the
attribute from the user's LDAP entry and put that value in the certificate request.
When the value is in the request, the certificate profile policy can be set to insert that value for an
extension value.
Summary of Contents for CERTIFICATE SYSTEM 8.0 - ADMINISTRATION
Page 42: ...20 ...
Page 43: ...Part I Setting up Certificate Services ...
Page 44: ......
Page 190: ...168 ...
Page 208: ...186 ...
Page 223: ...Part II Additional Configuration to Manage CA Services ...
Page 224: ......
Page 256: ...234 ...
Page 270: ...248 ...
Page 280: ...258 ...
Page 292: ...270 ...
Page 293: ...Part III Managing the Subsystem Instances ...
Page 294: ......
Page 408: ...386 ...
Page 438: ...416 ...
Page 439: ...Part IV References ...
Page 440: ......
Page 503: ...Netscape Defined Certificate Extensions Reference 481 OID 2 16 840 1 113730 13 ...
Page 504: ...482 ...
Page 556: ...534 ...
Page 564: ...542 ...