Client Certificate Management
This topic provides information about client certificate management.
- An IMM2 self-assigned certificate
- A certificate generated from an IMM2 CSR and signed (externally) by a third party CA.
- Certificates must be preserved across firmware updates.
- If a client certificate is not created for communication with the SKLM server, the IMM2 HTTPS server certificate is used.
- The function of the CA is to verify the identity of the IMM2.
- Generate a New Key and a Self-Signed Certificate
- Generate a New Key and a Certificate Signing Request (CSR)
Field | Description |
---|---|
Country1 | From the list item, select the country where the IMM2 physically resides. |
State or Providence1 | Type the state or providence where the IMM2 physically resides. |
City or Locality1 | Type the city or locality where the IMM2 physically resides. |
Organization Name1 | Type the company or organization name that owns the IMM2. |
IMM2 Host Name1 | Type the IMM2 host name that appears in the web address bar. |
Contact Person | Type the name of the contact person that is responsible for the IMM2. |
Email address | Type the email address of the contact person responsible for the IMM2. |
Organization Unit | Type the unit within the company that owns the IMM2. |
Surname | Type the surname of the person responsible for the IMM2. This field can contain a maximum of 60 characters. |
Given Name | Type the given name of the person responsible for the IMM2. This field can contain a maximum of 60 characters. |
Initials | Type the initials of the person responsible for the IMM2. This field can contain a maximum of 20 characters. |
DN Qualifier | Type the Distinguished Name Qualifier for the IMM2. This field can contain a maximum of 60 characters. |
|
After the client certificate has been generated you can download the certificate to storage on your IMM2 by selecting the Download Certificate action item.
The Generate a New Key and a Certificate Signing Request (CSR) action item generates a new encryption key and a CSR. In the Generate a New Key and a Certificate Signing Request window, type or select the information in the required fields and any optional fields that apply to your configuration, (see the following table). Click Ok, to generate your new encryption key and CSR.
A progress window displays while the CSR is being generated and a confirmation window is displayed upon successful completion. After generation of the CSR you must send the CSR to a CA for digital signing. Select the Download Certificate Signing Request (CSR) action item and click Ok to save the CSR to your server. You can then submit the CSR to your CA for signing.
Field | Description |
---|---|
Country1 | From the list item, select the country where the IMM2 physically resides. |
State or Providence1 | Type the state or providence where the IMM2 physically resides. |
City or Locality1 | Type the city or locality where the IMM2 physically resides. |
Organization Name1 | Type the company or organization name that owns the IMM2. |
IMM2 Host Name1 | Type the IMM2 host name that appears in the web address bar. |
Contact Person | Type the name of the contact person that is responsible for the IMM2. |
Email address | Type the email address of the contact person responsible for the IMM2. |
Organization Unit | Type the unit within the company that owns the IMM2. |
Surname | Type the surname of the person responsible for the IMM2. This field can contain a maximum of 60 characters. |
Given Name | Type the given name of the person responsible for the IMM2. This field can contain a maximum of 60 characters. |
Initials | Type the initials of the person responsible for the IMM2. This field can contain a maximum of 20 characters. |
DN Qualifier | Type the Distinguished Name Qualifier for the IMM2. This field can contain a maximum of 60 characters. |
Challenge Password | Type the password to the CSR. This field can contain a maximum of 30 characters. |
Unstructured Name | Type additional information, such as an unstructured name that is assigned to the IMM2. This field can contain a maximum of 60 characters. |
|
The CSR is digitally signed by the CA using the user's certificate processing tool, such as the OpenSSL or Certutil command line tool. All client certificates that are signed using the user's certificate processing tool have the same base certificate. This base certificate must also be imported to the SKLM server so that all servers digitally signed by the user are accepted by the SKLM server.
- For increased security use a certificate that is digitally signed by a CA.
- The certificate that is imported into the IMM2 must correspond to the CSR that was previously generated.
After a CA-signed certificate is imported into the IMM2, select the Download Certificate action item. When you select this action item, the CA-signed certificate is downloaded to storage on your IMM2.