7.9. Setting up a Standalone KRA or OCSP
This section describes how to install a standalone KRA and OCSP. A standalone installation provides the flexibility to use a non-Certificate System CA to issue the certificates, because the CSRs generated during the installation are not automatically submitted to the CA and imported into the subsystem. Additionally, a KRA or an OCSP installed in standalone mode is not part of the CA's security domain, and the connector in the CA for key archival will not be configured.
To install a standalone KRA or OCSP:
- Create a configuration file, such as
/root/config.txt
, with the following content:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - For a standalone KRA, add the following section to the configuration file:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - For a standalone OCSP, add the following section to the configuration file:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - To use an LDAPS connection to Directory Server running on the same host, add the following parameters to the
DEFAULT
section in the configuration file:pki_ds_secure_connection=True pki_ds_secure_connection_ca_pem_file=path_to_CA_or_self-signed_certificate
pki_ds_secure_connection=True pki_ds_secure_connection_ca_pem_file=path_to_CA_or_self-signed_certificate
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Note
For security reasons, Red Hat recommends using an encrypted connection to Directory Server.If you use a self-signed certificate in Directory Server, use the following command to export it from the Directory Server's Network Security Services (NSS) database:certutil -L -d /etc/dirsrv/slapd-instance_name/ \ -n "server-cert" -a -o /root/ds.crt
# certutil -L -d /etc/dirsrv/slapd-instance_name/ \ -n "server-cert" -a -o /root/ds.crt
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Proceed with the steps described in the section called “Starting the Installation of a Subsystem with an External CA”.