Install Axway Server and configure Futurex PKCS #11 Library with Axway VA Server
Perform the following tasks to install and configure the Axway VA server and configure SSL communication for the admin server:
Perform the following steps for your operating system to install the Axway VA server:
VA Server is no longer installed as an interactive service on Windows. This applies to both the Admin UI service and the Validation Authority Service that is installed as part of VA Server.
Using an Administrators identity, log on to the computer where you plan to install the VA Server
Copy the Validation_Authority_Server_win-x86-64_BNXXX.exe file that you received from Axway Global Support to the Windows system. Where:
- Release Version = 5.1_Install for 5.1 GA
- Release Release Version = 5.1_SP1 for Service Pack 1
The distributed installation file is digitally signed and checked by the Windows platform before installation.
Double-click Validation_Authority_Server_win-x86-64_BNXXX.exe. On the Welcome page, follow the on-screen instructions as you proceed through the installation:
- Select [ Next ] to move forward to the next installation window.
- Select [ Back ] to return to the previous installation window.
- Select [ Cancel ] to close the installation program without installing any component of the VA Server.
- To install VA Server, re-run the installation program.
- Select [ Next ].
On the License Agreement page, select [ Accept ] to accept the license agreement and go to the next page in the installer, or select [ No ] to cancel the installation.
On the Customer Information page, type your User Name, Company Name, and Email Address in the text fields provided. All fields except the email address are required. However, you should provide an email address because the VA administration server uses it to send email notifications.
Select [ Next ].
The Choose Destination Location page displays, showing the default destination folder where VA Server components are installed. To select a different destination folder, select [ Browse ] and enter the folder location.
Select [ Next ].
On the VA Server Information page, enter the following requested information on the hostname, port number, and user for the VA administration server:
Information
Description
VA server hostname
The hostname identifies the computer. The default hostname is the name of the computer on which you are installing the VA Server.
VA administration server port number
This port number identifies the port at which the VA administration server listens for HTTPS requests from the browser. If you use a port other than the default (13333), note it for future reference.
VA administration server user and password
This is the initial user who can log in to the VA administration server. The default user name is admin. If you enter a different name, make a note of it.
After installing and logging into the VA administration server with this user name, enter a new password with the following criteria:
- At least eight characters long.
- Contains at least one alphabetic character, one number, one special character, one upper-case character, and one lower-case character.
- Meets the requirements in the Manage VA administration server users section on page 77 of the Axway Validation Authority Administrator Guide.
Re-type the password to confirm it.
Select [ Next ] to continue.
Select either the option to generate a self-signed certificate or import a PFX or P12 file.
If you select Generate a Self-Signed Certificate, select [ Next ] and continue to step 11.
If you select Import PFX / P12 from file, perform the following steps:
- Select the file to import from the file selection dialog box and then select [ Open ].
- Enter a password to decrypt the file. This password originally protected the PFX file.
- By default, the Encrypt Admin UI Private Key option is selected. If you do not want this option, uncheck the box to disable the password field.
- Enter a password to encrypt the admin server key for the VA Server (see the password notes from step 8). This encryption option, along with the provided password, automatically calls apachepassphrase for an unattended startup.
- Select [ Next ] to continue.
On the Start Copying page, check the current settings to ensure they are as desired. If you need to make any changes to the settings, select [ Back ]. Otherwise, select [ Next ] to continue.
After the installation finishes, the InstallShield Wizard Complete page displays: The VA Server is successfully installed. You can verify this by using the Admin Server User Interface > Help > About page, which displays the current version.
Clear the Launch Administrative Server User Interface checkbox to start the VA administration server at a later time
Select [ Finish ].
The installation program adds the VA Server to your Start menu.
When you access Control Panel > Administrative Tools > Services, you see Axway Validation Authority and Axway VA Admin included in the list of services. You can access the VA Server admin UI and this document from the Start menu.
The installation also automatically creates an VA administrative server private key (adminserver.key) and SSL certificate (adminserver.crt) in the \entserv directory. (Example: C:\ProgramData\Axway\VA\entserv in Windows.)
You are now ready to use the VA administration server to configure, start, and manage the VA Server.
Perform the following tasks to configure the VA Server:
The admin UI requires an HTTPS server. This server is automatically installed and configured during VA Server installation. You can launch the admin UI automatically as the final step of installation from the desktop icon created during the installation or by accessing it directly from a browser using the VA administration server URL. For a standard connection, the URL is:
https://<hostname>:<port>
Where <hostname> and <port> are the VA Server host name and VA administration server port number you provided during installation (13333 by default).
The VA administration server is, by default, only available using SSL (HTTPS). Operating it using non-SSL (HTTP) disables certificate-based authentication for users.
When the web interface opens for the first time, you see an SSL certificate warning. Bypass this warning and proceed to the login page. Then, perform the following steps:
At the Administrative Login prompt, log in with Basic Authentication using the credentials set during installation.
After you log in, the home page of the admin UI displays.
Perform the following steps to install the license:
Select the Enter License menu on the left. You will see a blank text area where you can paste in a product license.
In the file manager for your system, find the VA Responder Temp license file that was provided by Axway Global Support.
Double-click the VA Responder Temp license file name to open it. Then, enter Ctrl+A to select all the text and Ctrl+C to copy to the clipboard.
Paste the license information into the blank text area on the Enter License page in the admin UI, and select [ Submit License ].
Enter the SAC ID that was provided by Axway Global Support, then select [ Verify License ].
If the submission is successful, the license information is available for your review on the Axway Validation Authority License page.
Select [ Next Step ] after you finish reviewing the information.
Perform the following steps to bypass the optional configurations:
On the Import Configuration File page, select [ Skip ].
On the Install Custom Extensions page, select [ NO ] and select [ Submit ].
To prevent unauthorized access to the VA Server, perform the following steps to change the server password:
If you already created a server password, type it into the Enter Current Server Password field. Otherwise, leave the field blank and go to the next step.
Type the password you want to use in Enter New Password.
The password must be at least eight characters long and contain one upper-case letter, one lower-case letter, one digit, and a special character.
Verify the new password by typing it into Confirm New Password and select [ Submit ].
Select [ Next Step ] to continue with the initial configuration. The Key Type Selection page displays.
Because you are using VA Server with an HSM device conforming to PKCS #11, you must configure VA Server to use the same password that you assigned to the HSM.
Because you must generate a public/private key pair for signing OCSP and SCVP responses when operating as a Responder, this key type is assigned as the default.
Perform the following steps to the key pair:
Select [ Submit Key Type ].
On the Key Generation/Import Mechanism page, perform the following steps:
- Select the Generate/Import Hardware Key on custom PKCS11 provider option.
- Set the Vendor as Other.
- Enter the location of the Futurex PKCS #11 library.
- Select [ Submit Key Generation Technique ].
You can configure the HSM type and PKCS #11 location in a configuration file rather than through the web user interface, but we don't recommend this. To do so, refer to the following information:
The valicert.ini file contains hardware signing device parameters for configuring an HSM for integration with VA, defined in the following table. These parameters are set automatically when VA Server detects an installed device.
ini file [pkcs11] Parameter | Type | Description |
---|---|---|
pkcs11DeviceEnable= | boolean | Enables PKCS11 device processing if set to 1. |
pkcs11LibraryPath= "path" | string | Defines the path to the library used by the PKCS11 device. This only needs to be provided if the path differs from that defined by the device. |
pkcs11SlotId= (-1=autosense, 1=ncipher using CAPI) | integer | Slot number of the PKCS11 device token. |
pkcs11VendorID= (-1=autosense, 0=generic, 1=SafeNet, 2=nCipher, 3=AEP, 5=CAPI) | integer | Specifies PKCS11 (hardware signing) vendor |
Set the pkcs11SlotId parameter to -1 (autosense) and the pkcs11VendorID parameter to 0 (generic). Soon, a pkcs11VendorID value specifically for Futurex will be available, but this is still in the works.
As a reminder, we strongly recommend you use the user interface to define these parameters, so only define them manually in the valicert.ini file if absolutely necessary.
For this integration, select Generate new private key so that Axway VA creates a key pair on the HSM with the key attributes that it requires.
Fill in all of the required information, and select [ Submit ].
In the User PIN field you must specify the password of the HSM Identity configured in the Futurex PKCS #11 (FXPKCS11) configuration file.
All of the Certificate Options should be left set to their default values.
If Axway VA successfully created the OCSP/SCVP Response Signing key on the HSM, you see the following message:
Self signed certificate for Default OCSP/SCVP Response Signing was created successfully.
You can use Excrypt Manager to view the two keys that Axway VA created in the Key Storage Table. One of them is a private key, and the other is a public key.
You can also view the keys by using FXCLI or PKCS11Manager, which comes packaged with the PKCS #11 (FXPKCS11) installation.
Before performing any configurations in the Axway VA admin UI, complete the following tasks directly on the HSM by using FXCLI:
- Generate a key pair
- Export a signing request (CSR)
- Sign the CSR with a test CA
After you complete these steps, perform the remaining configurations in this section on the machine running Axway VA.
Perform the following steps to configure FXCLI:
Run the HSM CLI program.
Set the TLS configuration to Anonymous by using the following command:
Anonymous TLS helps simplify the demonstration. We don't recommend using Anonymous in a production setting. If you choose to connect to the HSM anonymously, you must enable the Anonymous setting for the HSM production port.
Connect to the HSM through TCP.
Log in with the default admin identities. You must run this twice to log in with both Admin identities.
Create a new key pair in the next available slot on the HSM.
Add a PKCS #11 label to the private key.
The generate command in step 5 set AxwaySslKeyPair as the HSM label for the key pair. However, Axway VA cannot find the key using the HSM label. It must find it by using a PKCS #11 label. That is why you must run the preceding keytable extdata command, which sets the PKCS #11 label in a separate field from where the HSM label is set.
Generate a certificate signing request (CSR).
Sign the CSR with a certificate authority (CA) certificate.
You also created the CA certificate that you used to sign the Axway VA certificate by using FXCLI.
Go to the next task to import this signed certificate in the Axway VA admin UI.
Perform the following steps to configure Axway VA:
On the machine where you installed the Axway VA server, install the CA that signed the certificate we are importing in the Trusted Root Certificate Authorities store for Windows, or your browser's equivalent store.
Log in to the VA admin UI.
Go to the Create/Import Private Key menu, select SSL Communication For Admin Server, and select [ Submit Key Type ].
For the key generation/import mechanism, select Hardware Key Generation/Import using Other, and select [ Submit Key Generation Technique ].
Select Import previously generated private key, and select [ Submit Key Generation Or Import ].
Fill in all of the PKCS11 Token Information fields, paste in the PEM/BASE64 Certificate that you signed in the previous section, and select [ Submit Hardware Key to Import ].
In the Friendly Key Name field, set the value to the PKCS #11 label of the key. Also, the Slot ID field must be set to Auto Sense. If these two fields are not set correctly, Axway VA cannot find the private key associated with the signed certificate on the HSM.
If the certificate import is successful, you see the following message:
SUCCESS! Certificate for SSL Communication For Admin Server was imported successfully.
Start a command prompt as administrator and call apachepassphrase.
This sets the password in the registry. The Apache HTTP server automatically reads it from there by using apachepassphrase during startup.
Restart the Axway VA Admin service in the Service Control Panel for changes to take effect.