This section shows you how to configure TLS communication between the KMES Series 3 and the FXCL CNG module, where you plan to run Microsoft AD CS. Then, it covers general configurations on the KMES to enable Microsoft AD CS to integrate with the KMES to manage certificate authorities in a scalable manner and have secure storage, encryption, and signing through FXCL CNG.Documentation Index
Fetch the complete documentation index at: https://docs.futurex.com/llms.txt
Use this file to discover all available pages before exploring further.
Configure TLS communication
Perform the following tasks to configure TLS communication between the KMES Series 3 and the FXCL CNG module:- Create a certificate authority (CA).
- Generate a CSR for the System/Host API connection pair.
- Sign the System/Host API CSR.
- Export the Root CA.
- Export the signed System/Host API TLS certificate.
- Load the exported certificates into the System/Host API connection pair.
- Issue a client certificate for Microsoft AD CS.
- Export the signed Microsoft AD CS certificate as a PKCS #12 file.
Create a CA
Perform the following steps to create a CA:In the Certificate Authority window, enter a name for the Certificate Container, leave all other fields set to the default values, and select [ OK ].
Right-click the certificate container you just created and select Add Certificate > New Certificate.
On the Subject DN tab, select the Classic preset and set a Common Name for the certificate, such as
TLS CA Root.Generate a CSR
Perform the following steps to generate a CSR for the System/Host API connection pair:Under the System/Host API connection pair, uncheck the Use Futurex Certificates checkbox and select [ Edit ] next to PKI keys in the User Certificates section.
When warned that SSL will not be functional until new certificates are imported, select [ Yes ] to continue.
In the PKI Parameters window, leave all fields set to the default values and select [ OK ]*.
You should see that a PKI Key Pair is loaded in the Application Public Keys window
When prompted that the certificate signing request was successfully written to the file location that was selected, select [ OK ].
Sign the CSR
Perform the following steps to sign the System/Host API CSR:Right-click the System TLS CA Root certificate you created, then select Add Certificate > From Request.
In the file browser, find and select the CSR that was generated for the System/Host API connection pair.
Export the certificate
Perform the following steps to export the Root CA certificate:In the file browser, go to the location where you want to save the root CA certificate. Specify a name for the file and select [ Open ].
Select [ OK ].
A message box says that the PEM file was successfully written to the location that you specified.
Export the signed certificate
Perform the following steps to export the signed System/Host API TLS certificate:In the file browser, go to the location where you want to save the signed System/Host API TLS certificate. Specify a name for the file and select [ Open ].
Load the certificates
Perform the following steps to load the exported TLS certificates into the System/Host API connection pair:Under the System/Host API connection pair, select [ Edit ] next to Certificates in the User Certificates section.
In the file browser, select both the root CA certificate and the signed System/Host API certificate and select [ Open ].
The certificate chain appears in the Verified section.
Select [ OK ] to save the changes.
In the Network Options window, the System/Host API connection pair now shows Signed Loaded next to Certificates in the User Certificates section
Issue a client certificate
Perform the following steps to issue a client certificate for Microsoft AD CS from the CSR generated from the certreq policy file:On the Subject DN and Basic Info tabs, leave all fields set to the values that auto-populate from the CSR.
Export the certificate
Perform the following steps to export the signed Microsoft AD CS certificate:In the file browser, navigate to the location where you want to save the signed AD CS certificate. Specify a name for the file and select [ Open ].
Select [ OK ].
A message box states that the PEM file was successfully written to the location that you specified.
Configure general KMES settings for KMES to AD CS communication
Perform the following tasks to configure the KMES Series 3 for communication with Microsoft AD CS:- Add a PKI identity provider.
- Create an AD CS role with the required permissions.
- Create an AD CS identity with the correct assigned roles.
- Enable Host API commands.
Add a PKI identity provider
This section shows you how to create a new PKI Identity Provider, assign it a TLS authentication mechanism, and add it to an identity as a credential. This allows FXCL CNG to authenticate with the KMES by using the signed Microsoft AD CS certificate that you exported.On the Info tab of the Identity Provider Editor window, specify a name for the Identity Provider and uncheck the Enforce Dual Factor checkbox.
On the PKI Options tab, select [ Select ]. In the Certificate Selector window, expand the certificate tree you created, select the CA certificate that signed the ADCS and System/Host API connection pair certificates, and select [ OK ].
Create a role for Microsoft AD CS
Perform the following steps to create a role for Microsoft AD CS and grant it permission to use the PKI identity provider:In the Info tab of the Role Editor window, leave the Role Type set to Application, specify a Name for the role, such as
Microsoft AD CS, and change the number of Logins Required to 1. Leave all other fields set to the default values.On the Permissions tab, select the following permissions:
| Permission | Subpermissions |
|---|---|
| Certificate Authority | Add, Export, Upload |
| Cryptographic Operations | Sign |
| Keys | Add |
On the Advanced tab, set Allowed Ports to Host API only. Leave the other fields set to the default values and select [ OK ] to finish creating the role.
Go to Identity Management > Identity Providers, right-click the PKI identity provider, and select [ Permission ].
In the Set Object-Group Permissions window, select the Show all roles and permissions checkbox, select the drop-down menu next to the Microsoft AD CS role, and select the Use permission.
Create a new identity
Perform the following steps to create a new identity and assign it the Microsoft AD CS role and PKI authentication credentials:In the Info tab of the Identity Editor window, leave the Storage Type set to Application, and specify a Name for the identity. Leave all other fields set to the default values.
Perform the following steps on the Authentication tab:
- Select [ Add ] to add a new credential.
- In the Configure Credential window, select TLS Certificate in the Type drop-down list.
- Select the Provider and Mechanism that you created for this integration.
- Select [ OK ] to finish creating a credential.
Enable the Host API commands
Because FXCL CNG connects to the Host API port on the KMES, you must define which Host API commands to enable for FXCL CNG to execute. To set the enabled commands for the Microsoft AD CS operation, complete the following steps:Go to Administration > Configuration > Host API Options and enable the following commands:
| Command | Description and subcommands (If applicable) |
|---|---|
| CLKY | Manipulate application key Enable all subcommands |
| ECHO | Communication Test/Retrieve Version |
| RKCP | Get Command Permissions Enable all subcommands |
| RKGP | Export PKI key pair |
| RKGS | Generate Signature |
| RKLN | Lookup Objects |
| RKLO | Login user |
| RKPK | Pop Generated Key |
| RKUP | Import password-encrypted PKI |

