viii
Distributing a local host public key ················································································································· 323
About distribution of local host public keys ···························································································· 323
Exporting a host public key ···················································································································· 323
Displaying a host public key ··················································································································· 324
Configuring a peer host public key ················································································································· 324
About peer host public key configuration ······························································································· 324
Restrictions and guidelines for peer host public key configuration ························································ 325
Importing a peer host public key from a public key file ·········································································· 325
Entering a peer host public key ·············································································································· 325
Destroying a local key pair ····························································································································· 326
Display and maintenance commands for public keys ···················································································· 326
Examples of public key management ············································································································ 326
Example: Entering a peer host public key ······························································································ 326
Example: Importing a public key from a public key file ·········································································· 328
Configuring PKI ························································································· 331
About PKI ······················································································································································· 331
PKI terminology ······································································································································ 331
PKI architecture ······································································································································ 332
Retrieval, usage, and maintenance of a digital certificate ······································································ 333
PKI applications ····································································································································· 333
FIPS compliance ············································································································································ 333
PKI tasks at a glance ····································································································································· 333
Configuring a PKI entity ································································································································· 334
Configuring a PKI domain ······························································································································ 335
About PKI domain ·································································································································· 335
PKI domain tasks at a glance ················································································································· 335
Creating a PKI domain ··························································································································· 336
Specifying the trusted CA ······················································································································· 336
Specifying the PKI entity name ·············································································································· 336
Specifying the certificate request reception authority············································································· 336
Specifying the certificate request URL ··································································································· 337
Setting the SCEP polling interval and maximum polling attempts ························································· 337
Specifying the LDAP server ··················································································································· 337
Specifying the fingerprint for root CA certificate verification··································································· 337
Specifying the key pair for certificate request ························································································ 338
Specifying the intended purpose for the certificate ················································································ 338
Specifying the source IP address for PKI protocol packets ··································································· 339
Specifying the storage path for certificates and CRLs ··················································································· 339
Requesting a certificate·································································································································· 340
About certificate request configuration ··································································································· 340
Restrictions and guidelines for certificate request configuration ···························································· 340
Prerequisites for certificate request configuration ·················································································· 340
Enabling the automatic online certificate request mode········································································· 340
Manually submitting an online certificate request ·················································································· 341
Manually submitting a certificate request in offline mode ······································································· 342
Aborting a certificate request ························································································································· 342
Obtaining certificates······································································································································ 343
Verifying PKI certificates ································································································································ 344
About certification verification ················································································································ 344
Restrictions and guidelines for certificate verification ············································································ 344
Verifying certificates with CRL checking ································································································ 344
Verifying certificates without CRL checking ··························································································· 345
Exporting certificates ······································································································································ 346
Removing a certificate···································································································································· 346
Configuring a certificate-based access control policy ···················································································· 347
About certificate-based access control policies ····················································································· 347
Procedure ··············································································································································· 347
Display and maintenance commands for PKI ································································································ 348
PKI configuration examples ··························································································································· 348
Example: Requesting a certificate from an RSA Keon CA server ·························································· 349
Example: Requesting a certificate from a Windows Server 2003 CA server ········································· 351