Authenticate to the KMES Series 3 through SCEP
You can use several methods to authenticate to a key management server with SCEP. The capabilities depend on the SCEP client. The KMES Series 3 supports authenticating with a username and password or by using a TLS certificate with a PKI identity provider.
Both of these authentication methods require you to create a user on the KMES. The difference between the two methods is that for authentication with the TLS certificate, the name of the KMES user must match the Common Name of the TLS certificate.
The following sections cover the password and TLS certificate authentication methods.
Perform the following steps to authenticate with a username and password:
Go to Identity Management > Roles, and select [ Add ].
On the Info tab, set the following:
Setting
Required configuration
Type
Application
Name
SCEP
Login required
1
On the Advanced tab, set Allowed Ports to SCEP only.
Select [ OK ] to finish creating the role.
Go to Identity Management > Identities, right-click anywhere in the window, and select Add > Client Application.
On the Info tab of the Identity Editor window, select Application for the storage location, and specify SCEP as the identity name.
On the Assigned Roles tab, select the role you created.
On the Authentication tab, remove the default API Key mechanism and select [ Add ]. In the Configure Credential dialog, select Password in the Type drop-down menu, then select [ Change ]. Set a password and select [ Save ]. Then, select [ OK ] to finish configuring the credential.
Select [ OK ] to finish creating the identity.
Perform the following steps to authenticate with a TLS certificate:
Log in to the KMES Series 3 application interface with the default Admin identities.
Go to Identity Management > Identity Providers.
Right-click anywhere in the window and select Add > Provider > PKI.
On the Info tab of the Identity Provider Editor window, specify a name for the Identity Provider and uncheck Enforce Dual Factor.
On the PKI Options tab, select [ Select ]. In the Certificate Selector window, expand the certificate tree you previously created, select the CA certificate that signed the SCEP Client and SCEP connection pair certificates, and then select [ OK ].
Select [ OK ] to finish creating the PKI Identity Provider.
Right-click the Identity Provider you just created and select Add > Mechanism > TLS.
On the Info tab, specify a name for the authentication mechanism
On the PKI tab, leave all fields set to the default values.
Select [ OK ] to save.
Go to the Identity Management > Roles menu, then select [ Add ].
In the Info tab of the Role Editor window, use the following settings:
Setting
Required configuration
Type
Application
Name
SCEP
Login Required
1
On the Advanced tab, set Allowed Ports to SCEP only.
Select [ OK ] to finish creating the role.
Go to the Identity Management > Identities menu, right-click anywhere in the window, and select Add > Client Application.
On the Info tab of the Identity Editor window, select Application for the storage location and specify SCEP as the identity name.
On the Assigned Roles tab, select the role you created.
On the Authentication tab, remove the default API Key mechanism and select [ Add ]. In the Configure Credential window, select TLS Certificate in the Type drop-down menu, then select the Provider and Mechanism you created. Select [ OK ] to finish configuring the credential.
Select [ OK ] to finish creating the identity.