Configure KMES Series 3
This section covers the necessary configurations for this integration.
This section covers general configurations you must make on the to enable the PKCS #11 module to integrate for SSH Key Offloading.
Perform the following steps to create a new role and identity for SSH on the KMES Series 3:
A later section configures the identity name and password in the PKCS #11 configuration file.
Log in to the application interface with the default Admin identities.
Go to Identity Management > Roles, and select [ Add ].
In the Role Editor window, configure the following settings:
- Specify a name for the role.
- Set the number of logins required to 1.
- Navigate to the Advanced tab.
- Allow authentication to the Host API port only.
- Leave all other fields set to the default values.
Go to the Permissions tab and select the following permissions:
Permission
Subpermission
Certificate Authority
Export, Upload
Keys
Top-level permission only
Signing Approval
Add
Select [ OK ] to finish creating the role.
Go to Identity Management > Identities, right-click anywhere in the window, and select Add > Client Application.
In the Info tab of the Identity Editor window, select Application for the storage location and specify a name for the identity, such as crypto1.
In the Assigned Roles tab, select the role you created in the previous section.
Under Authentication, select the API Key mechanism and then [ Remove ]. Then select [ Add ] and set the type to Password. Set the password for the identity and then select [ OK ] to finish.
A later section configures the password in the Futurex PKCS #11 configuration file.
Select [ OK ] to finish creating the identity.
Because the PKCS #11 library connects to the Host API port on the , you must define which Host API commands to enable for execution by the FXPKCS11 library. To set the allowed commands, complete the following steps:
Log in to the application interface with the default Admin identities.
Go to Administration > Configuration > Host API Options, select the All preset to enable all commands, and then select [ Save ].
This section covers the steps required to configure TLS communication between the and the PKCS #11 library.
Log in to the application interface with the default Admin identities.
Select PKI > Certificate Authorities in the left menu, then select [ Add CA ] at the bottom of the page.
In the Certificate Authority window, enter a name for the certificate container, leave all other fields as the default values, and then select [ OK ].
The new certificate container now displays in the Certificate Authorities menu.
Right-click the certificate container and select Add Certificate > New Certificate.
In the Subject DN tab, set a Common Name for the certificate, such as System TLS CA Root.
On the Basic Info tab, leave all fields set to the default values.
In the V3 Extensions tab, select the Certificate Authority profile, then select [ OK ].
The root CA certificate now displays under the previously created certificate container.
Go to Administration > Configuration > Network Options.
In the Network Options window, go to the TLS/SSL Settings tab.
Under the System/Host API connection pair, uncheck Use Futurex certificates, and select [ Edit ] next to PKI Keys in the User Certificates section.
In the Application Public Keys window, select [ Generate ].
When warned that SSL will not be functional until new certificates are imported, select [ Yes ] to continue.
In the PKI Parameters window, leave the default values set and select [ OK ].
A message states that a PKI Key Pair is loaded in the Application Public Keys window.
Select [ Request ].
In the Subject DN tab, set a Common Name for the certificate, such as KMES.
In the V3 Extensions tab, select the TLS Server Certificate profile.
In the PKCS #10 Info tab, select a save location for the CSR, then select [ OK ].
A message states that the certificate signing request was successfully written to the file location selected.
Select [ OK ].
Select [ OK ] again to save the Application Public Keys settings.
The main Network Options window shows Loaded next to PKI Keys for the System/Host API connection pair.
Go to PKI > Certificate Authorities.
Right-click on the root CA certificate you created for this integration, and select Add Certificate > From Request.
Select the CSR generated for the System/Host API connection pair in the file browser.
After it loads, you don't need to modify any certificate settings. Select [ OK ].
The signed System/Host API certificate now displays under the root CA certificate on the Certificate Authorities page.
Go to PKI > Certificate Authorities.
Right-click the System TLS CA Root certificate, and select Export > Certificate(s).
In the Export Certificate window, change the encoding to PEM, and select [ Browse ].
In the file browser, go to the directory to save the Root CA certificate. Specify a name for the file and select [ Open ].
Select [ OK ].
A message box states that the PEM file was successfully written to your specified location.
Go to PKI > Certificate Authorities.
Right-click the KMES certificate and select Export > Certificate(s).
In the Export Certificate window, change the encoding to PEM and select [ Browse ].
In the file browser, go to the directory where you want to save the signed System/Host API certificate. Specify a name for the file and select [ Open ].
Select [ OK ].
A message states that the PEM file was successfully written to your specified location.
Go to Administration > Configuration > Network Options.
In the Network Options window, go to the TLS/SSL Settings tab.
Select [ Edit ] next to Certificates in the User Certificates section.
Right-click on the System/Host API SSL CA X.509 certificate container and select [ Import ].
Select [ Add ] at the bottom of the Import Certificates window.
Select the root CA certificate and the signed System/Host API certificate in the file browser and select [ Open ].
The certificate chain displays in the Verified section of the window.
Select [ OK ] to save the changes.
In the Network Options window, the System/Host API connection pair shows Signed loaded next to Certificates in the User Certificates section.
You configure the client certificate created here in the Futurex PKCS #11 configuration file.
Go to PKI > Certificate Authorities.
Right-click the System TLS CA Root certificate and select Add Certificate > New Certificate.
In the Subject DN tab, set a Common Name for the certificate.
Leave all settings in the Basic Info tab set to the default values.
In the V3 Extensions tab, select the TLS Client Certificate profile and select [ OK ].
The PKCS #11 client certificate will now be listed under the System TLS CA Root certificate.
To perform the following steps, go to Administration > Configuration > Options and enable the Allow export of certificates using password option.
Go to PKI > Certificate Authorities.
Right-click the PKCS #11 client certificate, and select Export > PKCS12.
Set a PKCS #12 password, leave Export Selected Certificate with Parents selected, and select [ Next ].
Select the storage device to use and select [ OK ].
Enter a name for the file, select the location where you want to save it, and select [ Open ].
You must move the FXPKCS11 Client certificate to the computer where the PKCS #11 module is installed. A later section configures it in the FXPKCS11 configuration file and uses it for TLS communication with the .
This section covers general SSH key offloading configuration.
Go to PKI > Certificate Authorities, then select [ Add CA ] at the bottom of the page.
Set the name of the certificate container, such as SSH Key Offloading, and set the Owner group to the role you created for this integration. Then select [ OK ].
Right-click on the certificate container you created and select Add Certificate > New Certificate.
In the Subject DN tab of the Create X.509 Certificate window, select the Classic Preset in the drop-down list and specify SSH as the certificate's Common Name.
In the Basic Info tab, you can leave the default values set.
In the V3 Extensions tab, leave the default value of None in the profile drop-down menu.
Select [ OK ] to finish creating the SSH client key pair.
Go to PKI > Signing Workflow and select [ Add Approval Group ] at the bottom of the page.
Specify SSH as the Name of the Approval Group and select [ OK ].
Right-click on the newly created Approval Group and select Permission.
Give the role created for SSH Key Offloading the Use permission, then select [ OK ].
Go to PKI > Certificate Authorities.
Right-click the SSH certificate and select Issuance Policy > Add.
In the Basic Info tab, set Approvals to 0 and Allowed Hashes to SHA-512.
In the X.509 tab, set the Default Approval Group to SSH.
In the Object Signing tab, select the Allow Object signing checkbox.
Select [ OK ] to apply the Issuance Policy to the SSH client certificate.
Right-click the SSH certificate and select Change Security Usage.
In the Security Usage drop-down menu, select Anonymous Signing.
Select [ OK ] to apply the change.
Go to PKI > Certificate Authorities.
Right-click on the SSH certificate and select Export > Public Key(s).
Browse for where you want to save the file and select [ Choose ].
Select [ OK ] in the dialog box that says, Successfully exported certificate public key(s).