Novell Certificate ServerTM allows you to mint, issue, and manage digital certificates by creating a Security container object and an Organizational Certificate Authority (CA) object. The Organizational CA object enables secure data transmissions and is required for Web-related products such as NetWare Web Manager and NetWare Enterprise Web Server. The first eDirectory server will automatically create and physically store the Security container object and Organizational CA object for the entire eDirectory tree. Both objects are created and must remain at the top of the eDirectory tree.
Only one Organizational CA object can exist in an eDirectory tree. Once the Organizational CA object is created on a server, it cannot be moved to another server. Deleting and re-creating an Organizational CA object invalidates any certificates associated with the Organizational CA.
IMPORTANT: Make sure that the first eDirectory server is the server that you intend to permanently host the Organizational CA object and that the server will be a reliable, accessible, and continuing part of your network.
If this is not the first eDirectory server on the network, the installation program finds and references the eDirectory server that holds the Organizational CA object. The installation program accesses the Security container and creates a Server Certificate object.
If an Organizational CA object is not available on the network, Web-related products will not function.
On Linux or Solaris, the administrator must manually create an Organizational CA object and the Server Certificate object.
To complete the tasks associated with setting up Novell Certificate Server, the administrator needs to have rights as described in the following table.
Table 19. Rights Required to Perform Tasks on Novell Certificate Server
The root administrator can also delegate the authority to use the Organizational CA by assigning the following rights to subcontainer administrators. Subcontainer administrators require the following rights to install Novell eDirectory with SSL security:
These rights are assigned to a group or a role.All the administrative users are defined in a Group or Role. For a complete list of required rights to perform specific tasks associated with Novell Certificate Server, refer to the online documentation for Novell Certificate Server.
eDirectory includes Public Key Cryptography Services (PKCS), which contains the Novell Certificate ServerTM that provides Public Key Infrastructure (PKI) services, Novell International Cryptographic Infrastructure (NICI), and SAS*-SSL server.
The following sections provide information about performing secure eDirectory operations:
For information about using external certificate authority, refer to Novell Certificate Server Administration Guide.
Verify the following conditions, which indicate that the NICI module has been properly installed and initialized:
If these conditions are not met, you must initialize the NICI module on the server as explained in Initializing the NICI Module on the Server.
Stop the eDirectory server.
Verify whether the NICI package is installed.
If the NICI package is not installed, install it now.
NOTE: You will not be able to proceed if the NICI package is not installed.
Copy the .nfk file provided with the package to the /var/novell/nici directory.
Execute the program /var/novell/nici/primenici
Start the eDirectory server.
To start PKI services, enter npki -1.
To stop PKI services, enter npki -u.
From ConsoleOne, right-click the security object at the Tree object level > click New > click Object.
Select NDSPKI: Certificate Authority > click OK > follow the online instructions.
Select the target server > enter an eDirectory object name.
In Creation Method, select Custom > click Next.
Select the key size > use the default values for other options > click Next.
In the Select Certificate Basic Constraints option, use the default values > click Next.
In Specify the Certificate Parameters, for Validity Period select Specify Dates.
For Effective Date, select a few days (3-5) before the system date > use the default values for all other options.
NOTE: The pkiconfig utility can also be utilized to create a Certificate Authority. For more information on using the pkiconfig utility, refer to the manpage pkiconfig.1m.
From ConsoleOne, right-click the container the LDAP Server object is in > click New > click Object.
Select NDSPKI: Key Material > OK.
Select the target server > enter a name > in Creation Method, select Custom > click Next.
Use the default values for Specify the Certificate Authority option, which will sign the certificate > click Next.
In Specify an RSA Key Size and How the Key Is to Be Used, select an appropriate key size > use the default values for all other options > click Next.
In Specify the Certificate Parameters, for Validity Period select Specify Dates.
For Effective Date, select a few days (3-5) before the system date > use the default values for all other options > click Next.
In Specify the Trusted Root Certificate to Be Associated with Server Certificate, use the default values > click Next.
Click Finish to create a key material.
In the General Property page, select the SSL certificate (KMO) > click Refresh NLDAP Server Now > click Close.
NOTE: The pkiconfig utility can also be used to create a Key Material Object. For more information on using the pkiconfig utility, refer to the manpage pkiconfig.1m.
Double-click the KMO object > go to the Certificates Property page > select Trusted Root Certificate > click Export > select File in Binary DER format > click OK.
Include this file in all command line operations that establish secure connections to eDirectory.