Create a CA
Perform the following steps to create a Certificate Authority (CA):In the Certificate Authority window, enter a name for the certificate container, leave all other fields as the default values, and select [ OK ].
The certificate container you created displays now in the Certificate Authorities menu.
Right-click the certificate container you just created and select Add Certificate > New Certificate.
On the Subject DN tab, change the Preset to “Classic”, then set a Common Name for the certificate, such as
System TLS CA Root.Generate and sign the KMIP Client Certificate
Choose one of the following optional methods for generating and signing the KMIP client certificate and perform the related steps:- Use an external CA (get and import the certificate)
- Use the KMES Series 3 as the CA
Use an external CA - Step 1: Get the certificate
You can run the OpenSSL commands in this section from the default terminal application for your operating system.Use an external CA - Step 2: Import the signed KMIP client certificate
Perform the following steps to import the signed KMIP client certificate and chain in a new X.509 certificate container on the KMES Series 3:Select the signed KMIP client certificate and all CA certificates in the certificate chain, and select [ Open ].
All of the certificates display in tree form in the Import Certificates window
Use the KMES Series 3 as the CA
Perform the following steps to use the KMES Series 3 as the CA:Right-click the Root CA certificate created previously (in Create a certificate authority on the KMES Series 3) and select Add Certificate > New Certificate.
The remaining steps in this section involve exporting the KMIP client certificate as a PKCS #12 file. To do this, you must enable a configuration option. Go to Administration> Configuration> Optionsand select the Allow export of certificates using passwords checkbox. Then, select [ Save ].
In the Export PKCS12 window, set the password by selecting [ Set Password ]. Enter the desired password and select [ Save ].For export options, select [ Export Selected Certificate with Parents ], set the Cipher Options to AES-256, and select [ Next ].
Browse for the folder in which to save the PKCS12 file on your designated storage medium. Enter a file name and then select [ Open ].
Configure TLS certificates for the KMIP server connection pair
This section provides instructions for the following tasks:- Generate a new PKI key pair and CSR for the KMIP connection pair.
- Issue a certificate from the KMIP connection pair CSR.
- Export the root CA and KMIP certificates as PEM files.
- Import the signed KMIP connection pair certificate.
Generate a key pair and CSR
Perform the following steps to generate a new PKI key pair and CSR for the KMIP connection pair:Select the Connection drop-down option and select the KMIP connection pair. If it is not already enabled, enable it.
In the User Certificates section, uncheck Use Futurex certificates if it is selected, and select **[ Edit ]**next to PKI keys.
In the PKI Parameters window, leave all fields set to the defaults and select [ OK ]*.
The Application Public Keys window now shows that a PKI Key Pair is Loaded.
On the Subject DN tab of the Create PKCS #10 Requestwindow, change the Common Name value to the IP address of the KMES.
When prompted that the certificate signing request was successfully written to the specified location, select [ OK ]*.
Issue a certificate
Perform the following steps to issue a certificate from the KMIP connection pair CSR:In the file browser, select the KMIP connection pair CSR.
Certificate information should populate in the Create X.509 From CSR window.
Export the certificates
Perform the following steps to export the root CA certificate and the signed KMIP connection pair certificates as PEM files:In the Export Certificate window for each, change the encoding to PEM, and specify a save location for the file.
Import the connection pair certificate
Perform the following steps to import the signed KMIP connection pair certificate:In the Certificate Authority window, right-click the **KMIP SSL CA **X.509 certificate container, and select [ Import ].
In the file browser, select both the root CA certificate and the signed KMIP server certificate and select [ Open ].
The certificates should now display in the Verified section of the Import Certificates window.
Select** [ OK ]** to save.
It now shows Signed loaded next to Certificates in the User Certificates section for the KMIP connection pair.

