7.2. Installing an IdM server with an integrated CA with keys and certificates stored on an HSM


The default configuration for the ipa-server-install command is an integrated CA as the root CA.

During the installation, you must supply basic configuration of the system, for example the realm, the administrator’s password and the Directory Manager’s password.

The ipa-server-install installation script creates a log file at /var/log/ipaserver-install.log. If the installation fails, the log can help you identify the problem.

Prerequisites

  • A supported networked HSM installed set up according to its vendors instructions. See Supported HSMs.
  • The HSM PKCS #11 library path, /opt/nfast/toolkits/pkcs11/libcknfast.so.
  • An available slot, token, and the token password.

Procedure

  1. Run the install command, ensuring you specify the location of the PKCS #11 library, the token name, and the token password:

    ipa-server-install -a <password> -p <dmpassword>-r <IDM.EXAMPLE.COM> -U --setup-dns --allow-zone-overlap --no-forwarders -N --auto-reverse --random-serial-numbers -–token-name=<HSM-TOKEN> --token-library-path=/opt/nfast/toolkits/pkcs11/libcknfast.so
  2. Specify the token password when prompted.

Verification

  1. Run certutil to display CA certificate information:

    certutil -L -d /etc/pki/pki-tomcat/alias
    
    Certificate Nickname                    Trust Attributes
                                            SSL,S/MIME,JAR/XPI
    
    caSigningCert cert-pki-ca               CT,C,C
    ocspSigningCert cert-pki-ca             ,,
    Server-Cert cert-pki-ca                 u,u,u
    subsystemCert cert-pki-ca               ,,
    auditSigningCert cert-pki-ca            ,,P

    Note that where there is no u listed under Trust Attributes for a certificate, it indicates the private keys are stored on the token. In this case, only the Server-Cert cert-pki-ca has the u flags as it is not installed on the HSM for performance reasons.

  2. Verify that the keys and certificates are stored on the HSM:

    certutil -L -d /etc/pki/pki-tomcat/alias -h <HSM-TOKEN>
    
    Certificate Nickname                                Trust Attributes
    	   SSL,S/MIME,JAR/XPI
    
    Enter Password or Pin for "<HSM-TOKEN>":
    <HSM-TOKEN>:subsystemCert cert-pki-ca                  	u,u,u
    <HSM-TOKEN>:ocspSigningCert cert-pki-ca                	u,u,u
    <HSM-TOKEN>:caSigningCert cert-pki-ca                  	CTu,Cu,Cu
    <HSM-TOKEN>:auditSigningCert cert-pki-ca               	u,u,Pu

    The certificate name is prefixed with the HSM token name, which indicates that the private keys and certificates are stored on the token.

    Where the keys are stored does not affect how users obtain or use certificates.

Red Hat logoGithubredditYoutubeTwitter

学习

尝试、购买和销售

社区

关于红帽文档

通过我们的产品和服务,以及可以信赖的内容,帮助红帽用户创新并实现他们的目标。 了解我们当前的更新.

让开源更具包容性

红帽致力于替换我们的代码、文档和 Web 属性中存在问题的语言。欲了解更多详情,请参阅红帽博客.

關於紅帽

我们提供强化的解决方案,使企业能够更轻松地跨平台和环境(从核心数据中心到网络边缘)工作。

Theme

© 2026 Red Hat
返回顶部