Install and configure ISC CertAgent for Linux
Perform the following tasks to install and configure the CertAgent and verify that it works properly.
Perform the following tasks:
The CertAgent package for Linux platforms consists of a zip archive that may be unzipped (with directory structure preserved) into any convenient directory on your server’s hard drive.
In a terminal, navigate to the certagent<version>-install directory. In this directory there should be a file called install.sh.
The CertAgent installer requires the location of the Futurex PKCS #11 (FXPKCS11) directory to be specified in the LD_LIBRARY_PATH environment variable. Run the following command to set the LD_LIBRARY_PATH variable and run the CertAgent installer in the same command (Note: The path to the FXPKCS11 library needs to be specific to where it is installed on your system):
The output should be similar to the following:
Hit Enter to confirm that the required directories are specified in the LD_LIBRARY_PATH variable.
Next you'll be required to scroll through the license agreement and then accept it.
The first prompt after the license agreement is particularly important. It will look like this:
Make sure that the first option is selected here, because we want Tomcat and HyperSQL database server to be installed automatically, and we want to generate TLS credentials using the .
For all prompts not specifically mentioned here, the default value can be selected.
At the following prompt, be sure to select option number one.
The installer will eventually prompt for the location of the FXPKCS11 library. The full path to the libfxpkcs11.so file should be provided.
If using an older version of CertAgent (e.g., CertAgent 6), it will ask for the HSM label. Leave the field blank and proceed with the rest of the installation.
The next prompt will display something similar to the following:
Confirm that you want to use the partition that it found, then enter the identity password configured inside the <CRYPTO-OPR-PASS> tag in the fxpkcs11.cfg file.
Next, CertAgent will create several different keys and certificates on the .
You can simply use the default values for all prompts.
You will be prompted to enter passwords for several different items. For each instance, specify a password of your choosing.
If the CertAgent installation completes successfully you will see output similar to the following:
Run the following command to set the system PIN:
This section verifies that CertAgent is communicating correctly with the .
After the installation completes, you can log in to the web UI to verify the keys have successfully been generated.
The Futurex Command Line Interface (FXCLI) can also be used to validate that the CertAgent keys and certificates have been generated and stored on the . Once connected and logged in, run the keytable list command.
The externalData and pkcs11Attributes fields and associated values were removed to shorten the output of the command.
If all 9 keys are present, the installation was successful.
The following requires the certificates installed by CertAgent to be added to the trusted list of your web browser.
The following URLs may be used to access CertAgent using Internet Explorer or Firefox.
System Administrative Site
- Admin controls over the system and server. Configuration settings can be done here as well. You must connect with the Admin certificate.
CA Account Site
- Allows the certificate enrollment, management, CRL, and other settings to be set when connected with the Admin certificate.
- Allows CSRs to be approved, signed, revoked, and other certificate enrollment tasks to be completed when connected with the Operations certificate.
Public Site
- Allows users to enroll, upload, and retrieve certificates to and from the when connected with the Client certificate.
Using the Public Site, send a certificate signing request (CSR) using the Enroll function. Using either Internet Explorer or Firefox, you can generate a key for a certificate to be signed by the .
After sending in a CSR, login to the CA Account Site using the Operations certificate and find the certificate in the pending section and issue it. Proper configuration of the application with the HSM will allow the certificate to be issued and retrieved all from the web.