Configure the Entrust Certificate Authority
Establish a preload session
The OCS or the Softcard must be preloaded to configure the Entrust Security Manager.
-
Create an empty folder called
preload
on theC:
drive. -
Edit the
cknfastrc
environment variables. Thecknfastrc
file can be found at%NFAST_HOME%\cknfastrc
, by defaultC:\Program Files\nCipher\nfast\cknfastrc
. Edit the file to include:# Softcard CKNFAST_LOADSHARING=1 # Enable Module Protection CKNFAST_FAKE_ACCELERATOR_LOGIN=1 # Other variables CKNFAST_NO_UNWRAP=1 CKNFAST_OVERRIDE_SECURITY_ASSURANCES=none # Preload file location NFAST_NFKM_TOKENSFILE=C:\preload\<filename> # PCKS #11 log level and file location CKNFAST_DEBUG=10 CKNFAST_DEBUGFILE=C:\preload\pkcs11.log
Useful information about environment variables:
-
The <filename> in
NFAST_NFKM_TOKENSFILE=C:\preload\<filename>
is user defined and will be referenced in thepreload
utility. For example,%NFAST_HOME%\Bin>preload -c <OCS Name> -f C:\preload\entrustsmtoken pause
. -
When using a K-of-N Card Set where K>1, set
CKNFAST_LOADSHARING=0
. When using a K-of-N Card Set where K=1, setCKNFAST_LOADSHARING=1
. This also applies to when using Softcards protection. -
For Enhanced Database Protection (EDP) use
CKNFAST_LOADSHARING=0
after enabling the database hardware protection. Restart the system for load sharing to work. -
When using nShield with ePassport CVCA, set
CKNFAST_ASSUME_SINGLE_PROCESS=0
. If ePassport Document Verifier Certificate requests are canceled, this setting ensures that the associated physical key is deleted in the Entrust nShield HSM.
For more information about the environment variables used in
cknfastrc
, see Environment variables -
-
Restart the hardserver.
C:\Users\Administrator>net stop "nFast Server" The following services are dependent on the nFast Server service. Stopping the nFast Server service will also stop these services. nShield Audit Log Service nFast Remote Administration Service Do you want to continue this operation? (Y/N) [N]: y ... The nFast Server service was stopped successfully. C:\Users\Administrator>net start "nFast Server" The nFast Server service is starting. The nFast Server service was started successfully
-
Open a command window to run preload exclusively.
Do not close this window throughout the Entrust Certificate Authority configuration. Otherwise you will shut down the session and the configuration will fail. It is OK to minimize the window. -
Preload the OCS by running the utility
preload -c
, orpreload -s
for the Softcard. Present the OCS cards and / or passphrase when prompted.For example:
C:\Users\Administrator>preload -c testOCS -f C:\preload\entrustsmtoken pause 2025-02-18 14:24:12: [1960]: INFO: Preload running with: -c testOCS -f C:\preload\entrustsmtoken pause 2025-02-18 14:24:12: [1960]: INFO: Created a (new) connection to Hardserver 2025-02-18 14:24:12: [1960]: INFO: Modules newly usable: [1]. 2025-02-18 14:24:12: [1960]: INFO: Found a change in the system: an update pass is needed. 2025-02-18 14:24:12: [1960]: INFO: Loading cardset: testOCS in modules: [1] Loading `testOCS': Module 1 slot 2: `testOCS' #2 Module 1 slot 0: Admin Card #11 Module 1 slot 3: empty Module 1 slot 4: empty Module 1 slot 5: empty Module 1 slot 2:- passphrase supplied - reading card Card reading complete. 2025-02-18 14:24:16: [1960]: INFO: Stored Admin key: kfips (003e...) in module #1 2025-02-18 14:24:16: [1960]: INFO: Loading cardset: Cardset: testOCS (edb3...) in module: 1 2025-02-18 14:24:16: [1960]: INFO: Stored Cardset: testOCS (edb3...) in module #1 2025-02-18 14:24:16: [1960]: INFO: Maintaining the cardset testOCS protected key(s)=[]. 2025-02-18 14:24:16: [1960]: INFO: Loading complete. Now pausing...
If non-persistent cards are used, then the last card in the quorum must remain inserted in the card reader. If persistent cards are used, then the last card in the quorum can be removed from the card reader. -
Confirm the OCS or Softcard has been preloaded by opening a separate command window and running the following utility. The loaded Objects will be reported.
-
For K-of-N OCS:
% preload.exe -c <cardsetname> -f <pathname>\<filename> nfkminfo
-
For Softcard:
% preload -s <softcardname> -f <pathname>\<filename> nfkminfo
For example:
C:\Users\Administrator>preload -c testOCS -f C:\preload\entrustsmtoken nfkminfo 2025-02-18 14:29:08: [316]: INFO: Preload running with: -c testOCS -f C:\preload\entrustsmtoken nfkminfo 2025-02-18 14:29:08: [316]: INFO: Created a (new) connection to Hardserver 2025-02-18 14:29:08: [316]: INFO: Modules newly usable: [1]. 2025-02-18 14:29:08: [316]: INFO: Found a change in the system: an update pass is needed. 2025-02-18 14:29:08: [316]: INFO: Maintaining the cardset testOCS protected key(s)=[]. 2025-02-18 14:29:08: [316]: INFO: Loading complete. Executing subprocess nfkminfo ... Pre-Loaded Objects ( 2): objecthash module objectid generation 003e04e3c07fb5791f651c992da5527779159f87 1 0x89fa8799 1 edb3d45a28e5a6b22b033684ce589d9e198272c2 1 0x89fa8782 1
Useful information concerning OCS:
-
You must present sufficient different OCS cards to fulfill the quorum.
-
The tokens file generated by the
preload
utility is valid for one continuous session only. If the session is lost, then the token authorization is lost. You cannot reuse the same token file once the session is lost, even if you use the exact same OCS cards again. To restart re-run preload. -
A session, and token authorization is lost if:
-
There is a temporary power failure.
-
The window running preload is closed.
-
The last card in the quorum is removed if using non-persistent OCS cards.
-
The tokens file represents a security risk if permissions to access it are not restricted to authorized persons only. -
Configure the Entrust nShield Edge
If you are using an Entrust nShield Edge HSM continue in this section. Otherwise, proceeded to Configure the Entrust Certificate Authority.
The Entrust nShield Edge exhibits slower service startup times compared to the other Entrust nShield HSMs. In order to ensure optimal performance, increase the Entrust Certificate Authority timeout settings as follows.
-
Navigate to the directory containing the
entMgr.ini
file, by default:C:\Program Files\Entrust\Certificate Authority\etc\ini
. -
Edit the
entMgr.ini
file in the [login] section and add the following:serviceStartStopWaitSeconds=3600 clusterStartWaitSeconds=1800 clusterStopWaitSeconds=300
Configure the Entrust Certificate Authority
This section describes how to configure the Entrust Certificate Authority before it can be used. During configuration you provide the following:
-
Your directory and database connections parameters.
-
Your choice of certificate algorithms, lifetimes, and other options.
The configuration is stored in file C:\Program Files\Entrust\Certificate Authority\etc\ini\entMgr.ini which can be manually edited before committing.
|
-
Navigate to the Certificate Authority
\bin
directory, by defaultC:\Program Files\Entrust\Certificate Authority\bin
. -
Double-click
entConfig.exe
. -
In the Database Deployment Model window, select according to your setup. We selected Yes in this integration to use the Entrust Certificate Authority PostgreSQL database installed locally as described in install-certificate-authority.adoc#install-authority-database.
-
In the Entrust Certificate Authority Configuration window, select Next.
-
In the Certificate Authority License Information window, enter the Enterprise licensing information that appears on your Entrust licensing card. Then select Next.
-
In the Certificate Authority Data and Backup Locations window, enter your location or accept the defaults. Then select Next.
-
Data files:
c:\authdata
. -
Backup files:
c:\entbackup
.
-
-
In the Directory Node and Port window, enter your directory information. We used the directory described in directory-service.adoc#configure-directory-service. Then select Next.
For example:
-
In the CA Distinguished Name and Password window, enter your CA DN and CA Directory access password, then select Test Bind Information.
-
If the bind is successful, select OK. Otherwise, correct any errors in your directory settings using the Back button and retest. Then select Next.
-
In the Directory Administrator Distinguished Name and Password window, enter your Directory administrator DN and Directory access password, then select Test Bind Information.
-
If the bind is successful, select OK. Otherwise, correct any errors in your directory settings using the Back button and retest. Then select Next.
-
On the Advanced Directory Attributes window, enter the full DN of the first officer. Then select Next.
-
On the Verify Directory Information window, check Verify Directory information now. Then select Next.
-
On the ENTDVT Logfile window, verify there are no errors in the Summary section. Correct any errors in your directory settings using the Back button before proceeding. Then select Next.
-
On the Current User’s Windows Login Password window, log in with your Windows credentials. Un-check Enable autologin for automatic service startup. Then select Next.
-
On the Database User and Password window, enter your database user credentials. Then select Next.
-
On the Database Backup User and Password window, enter your database backup user credentials. Then select Next.
-
On the Entrust Certificate Authority Port Configuration window, enter your information, then select Next.
-
On the CA Type window, select the Root CA radio button. Un-check Root CA used as Single Point of Contact CA (SPOC), then select Next.
-
On the Cryptographic Information window, select in each tab as follows. Select Next each time.
-
On the Certification Authority Key Generation tab, select Use hardware.
-
On the CA Key Type tab, select the key type and length.
-
On the Database tab, select the database encryption algorithm.
-
On the User Signing Key Type tab, select the key type and length.
-
On the User Encryption Key Type tab, select the key type and length.
-
On the CA Signing Algorithm Type tab, select the type.
-
On the Policy Certificate tab, enter the policy certificate lifetime.
For this integration to work with EC-P and RSAPSS, the ECC activation feature must be enabled for the Entrust nShield HSM. In the
%NFAST_ HOME%\bin
directory, runFET.exe
. -
If you are using the Entrust nShield Edge, go to the step after next. Otherwise, the No Hardware Device Found dialog appears. Select OK.
-
On the file explorer, select the nShield PKCS11 library
%NFAST_HOME%\toolkits\pkcs11\cknfast.dll
, default locationC:\Program Files\nCipher\nfast\toolkits\pkcs11\cknfast.dll
. -
On the Use This Hardware window, select the Entrust nShield HSM, then select Next.
-
On the CRL Configuration window, select No, do not work with Microsoft Windows applications, then select Next.
-
On the CRL Distribution Point Information window, select the CRL location, then select Next.
-
On the CA Certificate Properties window, enter the CA certificate lifetime and private key usage period, then select Next.
Consult your security policy of your organization about recommendations for CA lifetime.
-
On the CRL Share Warning window, select OK.
-
On the Configuration Complete window, check Run Entrust Certificate Authority Control Command Shell now to initialize the CA, then select OK.
The Entrust Certificate Authority Control Command Shell (
entsh
) launches, and starts the CA initialization process.You will have the option to initialize the CA later by running the
init
command from theentsh
command window. -
Enter and confirm the following passwords. Note these for future use.
Parameter Value HSM
OCS or softcard passphrase created in install-entrust-hsm.adoc#create-OCS-Softcard.
Master1-3
Master users new passwords
First Officer
First office new password
For example:
Starting First-Time Initialization... A Hardware Security Module (HSM) will be used for the CA key: nCipher Corp. Ltd SN : edb3d45a28e5a6b2 The HSM requires a password. Enter password for CA hardware security module (HSM): Enter new password for Master1: Confirm new password for Master1: Enter new password for Master2: Confirm new password for Master2: Enter new password for Master3: Confirm new password for Master3: Enter new password for First Officer: Confirm new password for First Officer: Initialization starting; creating ca keys... Initialization complete. Starting the services... Creating CA profile... Creating First Officer profile... You are logged in to Entrust Certificate Authority Control Command Shell. Performing database backup... SUCCESS: Full backup completed successfully. Press return to exit
-
Close the window above.