Before SCEP connections can occur, the SCEP client and KMES Series 3 must establish a mutual trust relationship by validating their respective digitally signed certificates. This section describes how to perform the following tasks:Documentation Index
Fetch the complete documentation index at: https://docs.futurex.com/llms.txt
Use this file to discover all available pages before exploring further.
- Create a CA on the KMES Series 3.
- Generate and sign the SCEP client certificate.
- Configure a TLS certificate for the SCEP Server connection pair.
Create a CA
Perform the following steps to create a Certificate Authority on the KMES Series 3:Generate and sign the SCEP client certificate
Choose one of the following optional methods for generating and signing the SCEP client certificate and perform the related steps:- Use an external CA to get and import the certificate
- Use the KMES Series 3 as the CA
Use an external CA - Step 1: Get the certificate
You can run the OpenSSL commands in this section from the default terminal application for your operating system.Construct a Certificate Signing Request (CSR)Run the following OpenSSL command to generate a CSR:
Shell
Use an external CA - Step 2: Import the signed SCEP client certificate
Perform the following steps to import the signed SCEP client certificate and chain in a new X.509 certificate container on the KMES Series 3:Select the signed SCEP client certificate and all CA certificates in the certificate chain, and select [ Open ].
All of the certificates display in tree form in the Import Certificates window
Use the KMES Series 3 as the CA
Right-click the Root CA certificate created previously (in Create a certificate authority on the KMES Series 3) and select Add Certificate > New Certificate.
The remaining steps in this section involve exporting the SCEP client certificate as a PKCS #12 file. To do this, you must enable a configuration option. Go to Administration> Configuration> Options and select the Allow export of certificates using passwords checkbox. Then, select [ Save ].
In the Export PKCS12 window, set the password by selecting [ Set Password ]. Enter the desired password and select [ Save ].For export options, select [ Export Selected Certificate with Parents ], set the Cipher Options to AES-256, and select [ Next ].
Browse for the folder in which to save the PKCS12 file on your designated storage medium. Enter a file name and then select [ Open ].
Configure a TLS certificate for the SCEP Server connection pair
Perform the following tasks to configure a TLS certificate for the SCEP Server connection pair:- Generate a new PKI key pair and CSR for the SCEP connection pair.
- Sign the SCEP connection pair CSR.
- Export all of the certificates in the certificate tree.
- Import the signed SCEP connection pair certificate.
Generate a key pair and CSR
Perform the following steps to generate a new PKI key pair and CSR for the SCEP connection pair:Go to Administration> Configuration> Network Options. On the TLS/SSL tab, select the Connection drop-down option and select the SCEP connection pair.
Select [ Yes ] and bypass the warning about SSL not being functional until new certificates are imported.
In the PKI Parameters window, set the PMK as the Encrypting Key, and change the Key Size to 2048. Select [ OK ].
The Application Public Keys window now shows that the PKI Key Pair is Loaded.
When a message box saying that the certificate signing request was successfully written to the specified location opens, select [ OK ] to close the message box.
Sign the CSR
Perform the following steps to sign the SCEP connection pair CSR:Go to PKI> Certificate Authorities. Right-click the Root CA certificate and select Add Certificate > From Request.
In the file browser, select the SCEP connection pair CSR.
Certificate information for the SCEP server certificate should automatically populate in the window.
Export all of the certificates
For each of the certificates in the certificate tree, perform the following steps:Import the signed certificate
Perform the following steps to import the signed SCEP connection pair certificate:Go to Administration> Configuration> Network Options. On the TLS/SSL tab, select the Connection drop-down menu and select the SCEP connection pair.
In the Certificate Authority dialog, right-click the SCEP SSL CA X.509 certificate container, and select [ Import ].
In the Import Certificates dialog, select [ Add ] at the bottom of the window. In the file browser, select both the root CA certificate and the signed SCEP server certificate and select [ Open ].
The certificates should now be listed in the Verified section of the Import Certificates dialog.
Select [ OK ] to save.
You should now see Signed loaded next to Certificates in the User Certificates section of the Network Options dialog.

