This section starts by covering the steps required to configure TLS communication between the KMES Series 3 and the FXCL CNG module, where Microsoft ADCS is running. Then, it covers general configurations that you must make on the KMES Series 3 to enable Microsoft ADCS to integrate with the KMES to manage certificate authorities in a scalable manner and enable secure storage, encryption, and signing by using FXCL CNG.Documentation Index
Fetch the complete documentation index at: https://docs.futurex.com/llms.txt
Use this file to discover all available pages before exploring further.
Configure TLS communication
Perform the following tasks to configure the KMES Series 3 for communication with the FXCL CNG module:- Add a PKI identity provider.
- Create an AD CS role with the required permissions.
- Create an AD CS identity with the correct assigned roles.
- Enable Host API commands.
Create a CA
Perform the following steps to create a Certificate Authority (CA):In the Certificate Authority window, enter a name for the Certificate Container, leave all other fields set to the default values, and select [ OK ].
Right-click the certificate container you just created and select Add Certificate > New Certificate.
On the Subject DN tab, select the Classic preset and set a Common Name for the certificate, such as
TLS CA Root.Generate a CSR
Perform the following steps to generate a CSR for the System/Host API connection pair:Under the System/Host API connection pair, uncheck the Use Futurex Certificates checkbox and select [ Edit ] next to PKI keys in the User Certificates section.
When warned that SSL will not be functional until new certificates are imported, select [ Yes ] to continue.
In the PKI Parameters window, leave all fields set to the default values and select [ OK ]*.
You should see that a PKI Key Pair is loaded in the Application Public Keys window
When prompted that the certificate signing request was successfully written to the file location that was selected, select [ OK ].
Sign the CSR
Perform the following steps to sign the System/Host API CSR:Right-click the System TLS CA Root certificate you created, then select Add Certificate > From Request.
In the file browser, find and select the CSR that was generated for the System/Host API connection pair.
Export the certificate
Perform the following steps to export the Root CA certificate:In the file browser, go to the location where you want to save the root CA certificate. Specify a name for the file, and select [ Open ].
Select [ OK ].
A message box says that the PEM file was successfully written to the location that you specified.
You must move the Root CA certificate to the computer where the Microsoft ADCS instance is running. A later section shows you how to configure and use it for TLS communication with the KMES Series 3.
Export the certificate
Perform the following steps to export the signed System/Host API TLS certificate:In the file browser, go to the location where you want to save the signed System/Host API TLS certificate. Specify a name for the file and select [ Open ].
Load the certificates
Perform the following steps to load the exported TLS certificates into the System/Host API connection pair:Under the System/Host API connection pair, select [ Edit ] next to Certificates in the User Certificates section.
In the file browser, select both the root CA certificate and the signed System/Host API certificate, and select [ Open ].
The certificate chain appears in the Verified section.
Select [ OK ] to save the changes.
In the Network Options window, the System/Host API connection pair now shows Signed Loaded next to Certificates in the User Certificates section
Issue a client certificate
Perform the following steps to issue a client certificate for Microsoft AD CS:On the Subject DN tab, set
ADCS as the Common Name for the certificate.The Common Name of the certificate must match the name of the identity to be created later in this guide.
Export the signed Microsoft AD CS certificate as a PKCS #12 file
Perform the following steps to export the signed Microsoft AD CS certificate as a PKCS #12 file:To complete the following steps, you must go to Administration > Configuration > Options and enable the Allow export of certificates using passwords option.
Specify a name for the PKCS #12 export file and select [ Open ].
A message window states that the PKCS #12 certificate export was successful.
You must move this PKCS #12 file to the computer where you installed AD CS. A later section shows you how to configure it in the Futurex CNG configuration file and use it for TLS communication with the KMES Series 3.
Configure general KMES settings
Perform the following tasks to configure the KMES Series 3 for communication with Microsoft AD CS:- Add a PKI identity provider.
- Create an AD CS role with the required permissions.
- Create an AD CS identity with the correct assigned roles.
- Enable Host API commands.
Add a PKI identity provider
This section shows you how to create a new PKI Identity Provider (IdP), assign it a TLS authentication mechanism, and add it to an identity as a credential. This allows FXCL CNG to authenticate with the KMES by using the signed Microsoft AD CS certificate that you exported.On the Info tab of the Identity Provider Editor window, specify a name for the IdP and uncheck the Enforce Dual Factor checkbox.
On the PKI Options tab, select [ Select ]. In the Certificate Selector window, expand the certificate tree you created, select the CA certificate that signed the ADCS and System/Host API connection pair certificates, and select [ OK ].
Create a role
Perform the following steps to create a role for Microsoft AD CS and grant it permission to use the PKI IdP:On the Info tab of the Role Editor window, leave the Role Type set to Application, specify a Name for the role, such as
Microsoft AD CS, and change the number of Logins Required to 1. Leave all other fields set to the default values.On the Permissions tab, select the following permissions:
| Permission | Sub-permissions |
|---|---|
| Certificate Authority | Add, Export, Upload |
| Cryptographic Operations | Sign |
| Keys | Add, Export |
On the Advanced tab, set Allowed Ports to Host API only. Leave the other fields set to the default values and select [ OK ] to finish creating the role.
Go to Identity Management > Identity Providers, right-click the PKI IdP, and select [ Permission ].
In the Set Object-Group Permissions window, select the Show all roles and permissions checkbox, select the drop-down menu next to the Microsoft AD CS role, and select the Use permission.
Create a new identity
Perform the following steps to create a new identity and assign it the Microsoft AD CS role and PKI authentication credentials:On the Info tab of the Identity Editor window, leave the Storage Type set to Application, and specify a Name for the identity. Leave all other fields set to the default values.
Perform the following steps on the Authentication tab:
- Select [ Add ] to add a new credential.
- In the Configure Credential window, select TLS Certificate in the Type drop-down list.
- Select the Provider and Mechanism that you created for this integration.
- Select [ OK ] to finish creating a credential.
Enable the Host API commands
Because FXCL CNG connects to the Host API port on the KMES, you must define which Host API commands to enable FXCL CNG to execute. To set the enabled commands for the Microsoft AD CS operation, complete the following steps:Go to Administration > Configuration > Host API Options and enable the following commands:
| Command | Description/Subcommands (If applicable) |
|---|---|
| CLKY | Manipulate the application key and enable all subcommands. |
| ECHO | Communication Test/Retrieve Version |
| RKGP | Export PKI keypair |
| RKGS | Generate Signature |
| RKLN | Lookup Objects |
| RKPK | Pop Generated Key |

