Privileged access management
Microsoft AD RMS

Configure KMES Series 3

14min

This section shows you how to configure TLS communication between the and the FX CSP module, where you plan to run Microsoft AD RMS. Then, it covers general configurations on the to enable AD RMS to integrate with the to manage certificate authorities in a scalable manner and have secure storage, encryption, and signing through FX CSP.

Configure TLS communication

Perform the following tasks to configure TLS communication between the and the FX CSP module:

  1. Create a certificate authority.
  2. Generate a CSR for the System/Host API connection pair.
  3. Sign the System/Host API CSR.
  4. Export the Root CA.
  5. Export the signed System/Host API TLS certificate.
  6. Load the exported certificates into the System/Host API connection pair.
  7. Issue a client certificate for Microsoft AD RMS.
  8. Export the signed Microsoft AD RMS certificate as a PKCS #12 file.

The following sections describe how to perform these tasks.

1 | Create a Certificate Authority (CA)

1

Log in to the application interface with the default Admin identities.

2

Go to PKI > Certificate Authorities and select [ Add CA ] at the bottom of the page.

3

In the Certificate Authority window, enter a name for the Certificate Container, leave all other fields set to the default values, and select [ OK ].

4

Right-click the certificate container you just created and select Add Certificate > New Certificate.

5

On the Subject DN tab, select the Classic preset and set a Common Name for the certificate, such as TLS CA Root.

6

On the Basic Info tab, leave all fields set to the default values.

7

On the V3 Extensions tab, select the Certificate Authority profile and select [ OK ].

The certificate container and the root CA certificate now displays in the Certificate Authorities window.

2 | Generate a CSR for the System/Host API connection pair

1

Go to Administration > Configuration > Network Options.

2

In the Network Options window, go to the TLS/SSL Settings tab.

3

Under the System/Host API connection pair, uncheck the Use Futurex Certificates checkbox and select [ Edit ] next to PKI keys in the User Certificates section.

4

In the Application Public Keys window, select [ Generate ].

5

When warned that SSL will not be functional until new certificates are imported, select [ Yes ] to continue.

6

In the PKI Parameters window, leave all fields set to the default values and select [ OK ].

You should see that a PKI Key Pair is loaded in the Application Public Keys window.

7

Select [ Request ].

8

On the Subject DN tab, set a Common Name for the certificate, such as KMES.

9

On the V3 Extensions tab, select the TLS Server Certificate profile.

10

On the PKCS #10 Info tab, select a save location for the CSR and select [ OK ].

11

When prompted that the certificate signing request was successfully written to the file location that was selected, select [ OK ].

12

Select [ OK ] again to save the Application Public Keys settings.

The main Network Options window now says Loaded next to PKI keys for the System/Host API connection pair.

3 | Sign the System/Host API CSR

1

Go to PKI > Certificate Authorities.

2

Right-click the System TLS CA Root certificate you created, and select Add Certificate > From Request.

3

In the file browser, find and select the CSR generated for the System/Host API connection pair.

4

After it loads, you don't need to modify the certificate's settings. Select [ OK ].

The signed System/Host API TLS certificate now shows under the TLS root CA certificate on the Certificate Authorities page.

4 | Export the Root CA certificate

1

Go to PKI > Certificate Authorities.

2

Right-click the System TLS CA Root certificate and select Export > Certificate(s).

3

In the Export Certificates window, change the encoding to PEM and select [ Browse ].

4

In the file browser, go to the location where you want to save the root CA certificate. Specify a name for the file, and select [ Open ].

5

Select [ OK ].

A message box states that the PEM file was successfully written to the location that you specified.

6

Move the Root CA certificate to the computer where the Microsoft ADCS instance is running. A later section shows you how to configure and use it for TLS communication with the .

5 | Export the signed System/Host API TLS certificate

1

Go to PKI > Certificate Authorities.

2

Right-click the certificate and select Export > Certificate(s).

3

In the Export Certificate window, change the encoding to PEM and select [ Browse ].

4

In the file browser, go to the location where you want to save the signed System/Host API TLS certificate. Specify a name for the file and select [ Open ].

5

Select [ OK ].

A message box states that the PEM file was successfully written to the location that you specified.

6 | Load the exported TLS certificates into the System/Host API connection pair

1

Go to Administration > Configuration > Network Options.

2

In the Network Options window, go to the TLS/SSL Settings tab.

3

Under the System/Host API connection pair, select [ Edit ] next to Certificates in the User Certificates section.

4

Right-click the System/Host API SSL CA X.509 certificate container and select [ Import ].

5

Select [ Add ] at the bottom of the Import Certificates window.

6

In the file browser, select both the root CA certificate and the signed System/Host API certificate, and select [ Open ].

The certificate chain appears in the Verified section.

7

Select [ OK ] to save the changes.

In the Network Options window, the System/Host API connection pair now shows Signed Loaded next to Certificates in the User Certificates section

8

Select [ OK ] to save and exit the Network Options window.

7 | Issue a client certificate for Microsoft AD RMS from the CSR generated from the certreq policy file

1

Go to PKI > Certificate Authorities.

2

Right-click the System TLS CA Root certificate and select Add Certificate > From Request.

3

In the file browser, select the ADCS CSR and select [ Open ].

4

On the Subject DN and Basic Info tabs, leave all fields set to the values that auto-populate from the CSR.

5

On the V3 Extensions tab, select the TLS Client Certificate profile and select [ OK ].

The AD RMS certificate now displays under the System TLS CA Root certificate.

8 | Export the signed Microsoft AD RMS certificate

1

Go to PKI > Certificate Authorities.

2

Right-click the AD RMS certificate and select Export > Certificate(s).

3

In the Export Certificate window, change the encoding to PEM and select [ Browse ].

4

In the file browser, navigate to the location where you want to save the signed AD RMS certificate. Specify a name for the file and select [ Open ].

5

Select [ OK ].

A message box states that the PEM file was successfully written to the location that you specified.

6

Move the signed Microsoft AD RMS certificate to the computer where the Microsoft AD RMS instance is running. A later section shows you how to configure and use it for TLS communication with the .

Configure general KMES settings for KMES to AD RMS communication

Perform the following tasks to configure the for communication with Microsoft AD RMS:

  1. Add a PKI identity provider.
  2. Create an AD RMS role with the required permissions.
  3. Create an AD RMS identity with the correct assigned roles.
  4. Enable Host API commands.

The following sections show you how to complete these tasks.

1 | Add a PKI identity provider

This section shows you how to create a new PKI identity provider, assign it a TLS authentication mechanism, and add it to an identity as a credential. This allows FX CSP to authenticate with the by using the signed Microsoft AD RMS certificate that you exported.

1

Go to Identity Management > Identity Providers.

2

Right-click anywhere in the window and select Add > Provider > PKI.

3

On the Info tab of the Identity Provider Editor window, specify a name for the identity provider and uncheck the Enforce Dual Factor checkbox.

4

On the PKI Options tab, select [ Select ]. In the Certificate Selector window, expand the certificate tree you created, select the CA certificate that signed the ADCS and System/Host API connection pair certificates, and select [ OK ].

5

Select [ OK ] to finish creating the PKI identity provider.

6

Right-click the identity provider that you created and select Add > Mechanism > TLS.

7

On the PKI tab, leave all fields set to the default values.

8

Select [ OK ] to save.

2 | Create a role for Microsoft AD RMS and grant it permission to use the PKI identity provider

1

Go to Identity Management > Roles and select [ Add ] at the bottom of the page.

2

In the Info tab of the Role Editor window, leave the Role Type set to Application, specify a Name for the role, such as Microsoft AD RMS, and change the number of Logins Required to 1. Leave all other fields set to the default values.

3

On the Permissions tab, select the following permissions:

Permission

Subpermissions



Certificate Authority

Add, Export, Upload



Cryptographic Operations

Sign



Keys

Add


4

On the Advanced tab, set Allowed Ports to Host API only. Leave the other fields set to the default values and select [ OK ] to finish creating the role.

5

Go to Identity Management > Identity Providers, right-click the PKI identity provider, and select [ Permission ].

6

In the Set Object-Group Permissions window, select the Show all roles and permissions checkbox, select the drop-down menu next to the Microsoft AD RMS role, and select the Use permission.

7

Select [ OK ] to save.

3 | Create a new identity and assign it the Microsoft AD RMS role and PKI authentication credentials

1

Go to Identity Management > Identities.

2

Right-click anywhere in the window and select Add > Client Application.

3

In the Info tab of the Identity Editor window, leave the Storage Type set to Application, and specify a Name for the identity. Leave all other fields set to the default values.

The name you specify must match the Common Name you chose for the ADCS certificate in the Issue a client certificate for Microsoft AD RMS from the CSR generated from the certreq policy file section of this guide.

4

On the Assigned Roles tab, select the Microsoft AD RMS role.

5

Perform the following steps on the Authentication tab:

  1. Select [ Add ] to add a new credential.
  2. In the Configure Credential window, select TLS Certificate in the Type drop-down list.
  3. Select the Provider and Mechanism that you created for this integration.
  4. Select [ OK ] to finish creating a credential.
6

Remove the default API Key mechanism, leaving only the TLS Certificate credential, and select [ OK ] to save.

4 | Enable the Host API commands for the Microsoft AD RMS operation

Because FX CSP connects to the Host API port on the , you must define which Host API commands to enable FX CSP to execute. To set the enabled commands, complete the following steps:

1

Go to Administration > Configuration > Host API Options and enable the following commands:

Command

Description and subcommands (If applicable)



ATKG

Manage HSM-Trusted Asymmetric Key Groups



ATTR

Manage Generic Attributes



CLKY

Manipulate application key

Enable all subcommands



ECHO

Communication Test/Retrieve Version



RAFA

Filter for Issuance Policies with USE Permissions



RKCP

Retrieve Command Permissions (Enabled Commands)



RKGP

Export PKI key pair



RKGS

Generate Signature



RKLN

Lookup Objects



RKPK

Pop Generated Key


2

Select [ Save ] to finish.