The following sections outline how OES 2 lets you automate certificate management for OES 2 and all HTTPS services:
By default, HTTPS services on SLES 10 SP1 are configured to use two files that are located in /etc/ssl/servercerts and are protected so that only root and some specific groups can read them:
serverkey.pem: This contains the server’s raw private key.
servercert.pem: This contains the server’s certificates.
OES 2 services, such as Apache, OpenWBEM, and Novell Remote Manager, are also configured to use these certificates.
OES 2 enhances certificate management as follows:
As you install eDirectory™ and OES 2, by default all HTTPS services are configured to use eDirectory certificates. This means that eDirectory is established as the Certificate Authority for the tree you are installing into, and it will generate keys and certificates for the server and replace the installed SLES certificates with the eDirectory certificates.
Key and certificate files are installed in the following locations:
Table 22-1 File Locations
The component that generates eDirectory keys and certificates is the Novell Certificate Server™.
This certificate server provides public key cryptography services that are natively integrated into Novell eDirectory. You use the server to can mint, issue, and manage both user and server certificates to protect confidential data transmissions over public communications channels such as the Internet.
For complete information on the Novell Certificate Server, see the Novell Certificate Server 3.3 Administration Guide.
When activated, Server Self-Provisioning lets server objects in eDirectory create their own certificates. You must activate this option if you want PKI Health Check to automatically maintain your server certificates.
For more information on this feature, see X.509 Certificate Self-Provisioning
in the Novell Certificate Server 3.3 Administration Guide.
The PKI health check runs whenever the certificate server starts.
If you have enabled Server Self-Provisioning, the health check routine automatically replaces server certificates when any of the following are detected:
The certificates don’t exist.
The certificates have expired.
The certificates are about to expire.
The IP or DNS information on the certificates doesn’t match the server configuration.
The Certificate Authority (CA) that issued the certificate is different from the CA currently configured.
For more information on this feature, see PKI Health Check
in the Novell Certificate Server 3.3 Administration Guide.
The Organizational CA can be configured to act as a sub-CA. This lets multiple trees share a common root certificate. The root certificate can be stored in a physically protected tree. It can also integrate with a third-party PKI. For more information, see Subordinate Certificate Authority
in the Novell Certificate Server 3.3 Administration Guide.