Este conteúdo não está disponível no idioma selecionado.
Chapter 10. Setting up PKI ACME responder
This chapter describes the installation and initial configuration on an ACME responder on a PKI server that already has a CA subsystem.
The following assumes you installed the CA with the default instance name (i.e. pki-tomcat
).
For information on how to manage PKI ACME Responder, see the Managing PKI ACME Responder chapter in the Red Hat Certificate System Administration Guide.
10.1. Installing PKI ACME Responder Copiar o linkLink copiado para a área de transferência!
To install PKI ACME Responder on your PKI server,
First download and install the
pki-acme
RPM package:dnf install pki-acme
$ dnf install pki-acme
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create an ACME responder in a PKI server instance using the following command:
pki-server acme-create
$ pki-server acme-create
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
This creates the initial configuration files in the /etc/pki/pki-tomcat/acme
directory.
For more information, see the pki-server-acme
manpage.
10.2. Configuring an ACME database Copiar o linkLink copiado para a área de transferência!
This section describes how to configure a database for the ACME responder. The database configuration is located at /etc/pki/pki-tomcat/acme/database.conf
.
You can configure the database via command-line using the
pki-server acme-database-mod
command. Invoking this command without any parameters launches an interactive mode, for example:Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Invoking the command with the
--type
parameter creates a new configuration based on the specified type. - Invoking the command with other parameters updates the specified parameters.
Certain ACME configuration properties are stored in the database, enabling you to configure all ACME responders in the cluster consistently. By default, the ACME responder directly accesses the database when retrieving or updating the ACME configuration properties, which may increase the load on the database. Some databases might provide an ACME configuration monitor to reduce this load.
10.2.1. Configuring a DS database Copiar o linkLink copiado para a área de transferência!
You can configure the ACME responder to use a DS database. A sample DS database configuration is available at /usr/share/pki/acme/database/ds/database.conf
.
To configure a DS database:
First add the ACME DS schema by importing the
/usr/share/pki/acme/database/ds/schema.ldif
file with the following command:ldapmodify -h $HOSTNAME -x -D "cn=Directory Manager" -w Secret.123 \ -f /usr/share/pki/acme/database/ds/schema.ldif
$ ldapmodify -h $HOSTNAME -x -D "cn=Directory Manager" -w Secret.123 \ -f /usr/share/pki/acme/database/ds/schema.ldif
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Next, prepare an LDIF file to create the ACME subtree. A sample LDIF file is available at
usr/share/pki/acme/database/ds/create.ldif
. This example usesdc=acme,dc=pki,dc=example,dc=com
as the base DN. Import the LDIF file using the
ldapadd
command:ldapadd -h $HOSTNAME -x -D "cn=Directory Manager" -w Secret.123 \ -f /usr/share/pki/acme/database/ds/create.ldif
$ ldapadd -h $HOSTNAME -x -D "cn=Directory Manager" -w Secret.123 \ -f /usr/share/pki/acme/database/ds/create.ldif
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Copy the sample database configuration file from
/usr/share/pki/acme/database/ds/database.conf
into the/etc/pki/pki-tomcat/acme
directory, or execute the following command to customize some of the parameters:pki-server acme-database-mod --type ds \ -DbindPassword=Secret.123
$ pki-server acme-database-mod --type ds \ -DbindPassword=Secret.123
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Customize the configuration as needed:
In a standalone ACME deployment, the
database.conf
should look like the following:Copy to Clipboard Copied! Toggle word wrap Toggle overflow In a shared CA and ACME deployment, the database.conf should look like the following:
class=org.example.acme.database.DSDatabase configFile=conf/ca/CS.cfg baseDN=dc=acme,dc=pki,dc=example,dc=com
class=org.example.acme.database.DSDatabase configFile=conf/ca/CS.cfg baseDN=dc=acme,dc=pki,dc=example,dc=com
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
The DS database provides an ACME configuration monitor using search persistence. You can enable it by enabling setting the following parameter: monitor.enabled=true
10.3. Configuring ACME Issuer Copiar o linkLink copiado para a área de transferência!
This section describes how to configure an issuer for PKI ACME Responder. The configuration for ACME Issuer is located at /etc/pki/pki-tomcat/acme/issuer.conf
.
You can configure the issuer via command-line using the pki-server acme-issuer-mod
command.
Invoking this command without any parameters launches an interactive mode, for example:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Invoking the command with the
--type
parameter creates a new configuration based on the specified type. - Invoking the command with other parameters updates the specified parameters.
10.3.1. Configuring PKI Issuer Copiar o linkLink copiado para a área de transferência!
You can configure PKI ACME Responder to issue certificates using PKI Issuer. A sample configuration is available at /usr/share/pki/acme/issuer/pki/issuer.conf
.
To configure a PKI issuer, copy this sample
issuer.conf
into the/etc/pki/pki-tomcat/acme
directory or execute the following command to customize some of the parameters:pki-server acme-issuer-mod --type pki \ -Dusername=caadmin \ -Dpassword=Secret.123
$ pki-server acme-issuer-mod --type pki \ -Dusername=caadmin \ -Dpassword=Secret.123
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Customize the configuration as needed. The
issuer.conf
file should look like the following:class=org.example.acme.issuer.PKIIssuer url=https://localhost.localdomain:8443 profile=acmeServerCert username=caadmin password=Secret.123
class=org.example.acme.issuer.PKIIssuer url=https://localhost.localdomain:8443 profile=acmeServerCert username=caadmin password=Secret.123
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - The url parameter specifies the PKI issuer location.
- The profile parameter specifies the certificate profile to use.
- To use client certificate authentication, specify the client certificate nickname in the nickname parameter.
- To use basic authentication, specify the username in the username parameter as well as the password in the password parameter.
10.4. Configuring ACME Realm Copiar o linkLink copiado para a área de transferência!
This section describes how to configure a realm for PKI ACME responder. The realm configuration is located at /etc/pki/pki-tomcat/acme/realm.conf
.
You can configure ACME Realm via command line using the pki-server acme-realm-mod
command.
Invoking this command without any parameters launches an interactive mode, for example:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Invoking the command with the
--type
parameter creates a new configuration based on the specified type. - Invoking the command with other parameters updates the specified parameters.
10.4.1. Configuring DS Realm Copiar o linkLink copiado para a área de transferência!
You can configure PKI ACME Responder to use a Directory Server realm. A sample configuration for DS Realm is available at /usr/share/pki/acme/realm/ds/realm.conf
.
To configure a Directory Server realm:
-
Prepare subtrees for ACME users and groups in DS. A sample LDIF file is available at
/usr/share/pki/acme/realm/ds/create.ldif]
. This example usesdc=acme,dc=pki,dc=example,dc=com
as the base DN. Import the LDIF file using the
ldapadd
command:ldapadd -h $HOSTNAME -x -D "cn=Directory Manager" -w Secret.123 \ -f /usr/share/pki/acme/realm/ds/create.ldif
$ ldapadd -h $HOSTNAME -x -D "cn=Directory Manager" -w Secret.123 \ -f /usr/share/pki/acme/realm/ds/create.ldif
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Copy the sample configuration file from
/usr/share/pki/acme/realm/ds/realm.conf
into the/etc/pki/pki-tomcat/acme
directory, or run the following command to customize some of the parameters:pki-server acme-realm-mod --type ds \ -DbindPassword=Secret.123
$ pki-server acme-realm-mod --type ds \ -DbindPassword=Secret.123
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Customize the configuration as needed:
In a standalone ACME deployment, the
realm.conf
file should look like the following:Copy to Clipboard Copied! Toggle word wrap Toggle overflow In a shared CA and ACME deployment, the
realm.conf
file should look like the following:class=org.example.acme.realm.DSRealm configFile=conf/ca/CS.cfg usersDN=ou=people,dc=ca,dc=pki,dc=example,dc=com groupsDN=ou=groups,dc=ca,dc=pki,dc=example,dc=com
class=org.example.acme.realm.DSRealm configFile=conf/ca/CS.cfg usersDN=ou=people,dc=ca,dc=pki,dc=example,dc=com groupsDN=ou=groups,dc=ca,dc=pki,dc=example,dc=com
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
10.5. Deploying ACME Responder Copiar o linkLink copiado para a área de transferência!
Once you have configured the ACME responder, deploy it using the following command:
pki-server acme-deploy
$ pki-server acme-deploy
Copy to Clipboard Copied! Toggle word wrap Toggle overflow This creates a deployment descriptor at
/etc/pki/pki-tomcat/Catalina/localhost/acme.xml
.The PKI server starts ACME Responder automatically after a few seconds, you do not need to restart the server.
To verify that ACME Responder is running, use the following command:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
For more information, see the pki-server-acme
manpage.