Certificate Authority
Venafi Adaptable CA

Configure KMES TLS communication

9min

This section shows users how to set up TLS certificates for the connection between the Venafi TPP instance and the System/Host API connection pair on the KMES Series 3.

To configure communications, perform the following tasks detailed in this section:

  1. Create a CA.
  2. Generate a CSR for the System/Host API connection pair.
  3. Sign the System/Host API CSR.
  4. Export the Root CA certificate.
  5. Export the signed System/Host API certificate.
  6. Load the exported certificates into the System/Host API connection pair.
  7. Issue a client certificate for Venafi TPP.
  8. Export the Venafi certificate as a PKCS #12 file.

Create a Certificate Authority (CA)

1

Log in to the KMES Series 3 application interface with the default Admin identities.

2

Go to PKI > Certificate Authorities.

3

Select [ Add CA ] at the bottom of the page.

4

In the Certificate Authority window, enter a name for the certificate container, select the Venafi Adaptable CA role in the Owner group drop-down menu, and select [ OK ].

The certificate container that you just created now displays in the Certificate Authorities menu.

5

Right-click the certificate container and select Add Certificate > New Certificate.

6

On the Subject DN tab, set a Common Name for the certificate, such as System TLS CA Root.

7

On the Basic Info tab, leave the fields set to the default values.

8

On the V3 Extensions tab, select the Certificate Authority profile and select [ OK ].

The root CA certificate now displays under the previously created certificate container.

Generate a CSR for the System/Host API connection pair

1

Go to Administration > Configuration > Network Options.

2

In the Network Options window, go to the TLS/SSL Settings tab.

3

Under the System/Host API connection pair, uncheck the Use Futurex certificates checkbox and then select [ Edit ] next to PKI Keys in the User Certificates section.

4

In the Application Public Keys window, select [ Generate ].

5

When warned that SSL will not be functional until new certificates are imported, select [ Yes ] to continue.

6

In the PKI Parameters window, set the Encrypting key to PMK, Key type to RSA, and Key size to 2048. Select [ OK ] to save.

The Application Public Keys window now shows that a PKI key pair is Loaded.

7

Select [ Request ].

8

On the Subject DN tab, you can leave the Common Name set to the default value of System/Host API.

9

On the V3 Extensions tab, select the TLS Server Certificate profile.

10

On the PKCS #10 Info tab, select a save location for the CSR and select [ OK ].

11

When notified that the certificate signing request was successfully written to the file location that was selected, select [ OK ].

12

Select [ OK ] again to save the Application Public Keys settings.

The main Network Options window now shows Loaded next to PKI Keys for the System/Host API connection pair.

13

Select [ OK ] to save and close the Network Options window.

Sign the System/Host API CSR

1

Go to PKI > Certificate Authorities.

2

Right-click the root CA certificate you created for TLS and select Add Certificate > From Request.

3

In the file browser, select the CSR that you generated for the System/Host API connection pair.

4

After it loads, don't modify any certificate settings. Select [ OK ].

The signed System/Host API certificate now shows under the root CA certificate on the Certificate Authorities page.

Export the Root CA certificate

1

Go to PKI > Certificate Authorities.

2

Right-click the System TLS CA Root certificate and select Export > Certificate(s).

3

In the Export Certificate window, change the encoding to PEM and select [ Browse ].

4

In the file browser, navigate to the location where you want to save the Root CA certificate. Specify a name for the file and select [ Open ].

5

Select [ OK ].

A message box states that the PEM file was successfully written to the location that you specified.

Export the signed System/Host API certificate

1

Go to PKI > Certificate Authorities.

2

Right-click the System/Host API TLS certificate and select Export > Certificate(s).

3

In the Export Certificate window, change the encoding to PEM and select [ Browse ].

4

In the file browser, navigate to the location where you want to save the System/Host API TLS certificate. Specify a name for the file and select [ Open ].

5

Select [ OK ].

A message box states that the PEM file was successfully written to the location that you specified.

Load the exported certificates into the System/Host API connection pair

1

Go to Administration > Configuration > Network Options.

2

In the Network Options window, go to the TLS/SSL Settings tab.

3

Under the System/Host API connection pair, select [ Edit ] next to Certificates in the User Certificates section.

4

Right-click the System/Host API SSL CA X.509 certificate container and select [ Import ].

5

Select [ Add ] at the bottom of the Import Certificates window.

6

In the file browser, select both the root CA certificate and the signed System/Host API certificate and select [ Open ].

7

Select [ OK ] to save the changes.

In the Network Options window, the System/Host API connection pair now shows Signed loaded next to Certificates in the User Certificates section.

8

Select [ OK ] to save and exit the Network Options window.

Issue a client certificate for Venafi TPP

1

Go to PKI > Certificate Authorities.

2

Right-click the System TLS CA Root certificate and select Add Certificate > New Certificate.

3

On the Subject DN tab, set a Common Name for the certificate, such as Venafi.

4

Leave all fields on the Basic Info tab set to the default values.

5

On the V3 Extensions tab, select the TLS Client Certificate profile and select [ OK ].

The Venafi certificate now displays under the System TLS CA Root certificate.

Export the Venafi certificate as a PKCS #12 file

To perform the following steps, you must go to Administration > Configuration > Options and enable the Allow export of certificates using passwords option.

1

Go to PKI > Certificate Authorities.

2

Right-click the Venafi certificate and select Export > PKCS12.

3

Select the Export Selected option, specify a unique name for the export file, and select [ Next ].

4

Enter a file password of your choice and select [ Next ].

5

Select [ Finish ] to initiate the export.

6

Move both the Venafi certificate and the Root CA certificate that you exported in the Export the Root CA Certificate section to the computer that runs the Venafi TPP instance.

A later section shows you how to configure and use them for TLS communication with the KMES Series 3.