Configure the Entrust Certificate Authority

Establish a preload session

The OCS or the Softcard must be preloaded to configure the Entrust Security Manager.

  1. Create an empty folder called preload on the C: drive.

  2. Edit the cknfastrc environment variables. The cknfastrc file can be found at %NFAST_HOME%\cknfastrc, by default C:\Program Files\nCipher\nfast\cknfastrc. Edit the file to include:

    # Softcard
    CKNFAST_LOADSHARING=1
    
    # Enable Module Protection
    CKNFAST_FAKE_ACCELERATOR_LOGIN=1
    
    # Other variables
    CKNFAST_NO_UNWRAP=1
    CKNFAST_OVERRIDE_SECURITY_ASSURANCES=none
    
    # Preload file location
    NFAST_NFKM_TOKENSFILE=C:\preload\<filename>
    
    # PCKS #11 log level and file location
    CKNFAST_DEBUG=10
    CKNFAST_DEBUGFILE=C:\preload\pkcs11.log

    Useful information about environment variables:

    • The <filename> in NFAST_NFKM_TOKENSFILE=C:\preload\<filename> is user defined and will be referenced in the preload utility. For example, %NFAST_HOME%\Bin>preload -c <OCS Name> -f C:\preload\entrustsmtoken pause.

    • When using a K-of-N Card Set where K>1, set CKNFAST_LOADSHARING=0. When using a K-of-N Card Set where K=1, set CKNFAST_LOADSHARING=1. This also applies to when using Softcards protection.

    • For Enhanced Database Protection (EDP) use CKNFAST_LOADSHARING=0 after enabling the database hardware protection. Restart the system for load sharing to work.

    • When using nShield with ePassport CVCA, set CKNFAST_ASSUME_SINGLE_PROCESS=0. If ePassport Document Verifier Certificate requests are canceled, this setting ensures that the associated physical key is deleted in the Entrust nShield HSM.

    For more information about the environment variables used in cknfastrc, see Environment variables

  3. Restart the hardserver.

    C:\Users\Administrator>net stop "nFast Server"
    The following services are dependent on the nFast Server service.
    Stopping the nFast Server service will also stop these services.
    
       nShield Audit Log Service
       nFast Remote Administration Service
    
    Do you want to continue this operation? (Y/N) [N]: y
    ...
    The nFast Server service was stopped successfully.
    
    C:\Users\Administrator>net start "nFast Server"
    The nFast Server service is starting.
    The nFast Server service was started successfully
  4. Open a command window to run preload exclusively.

    Do not close this window throughout the Entrust Certificate Authority configuration. Otherwise you will shut down the session and the configuration will fail. It is OK to minimize the window.
  5. Preload the OCS by running the utility preload -c, or preload -s for the Softcard. Present the OCS cards and / or passphrase when prompted.

    For example:

    C:\Users\Administrator>preload -c testOCS -f C:\preload\entrustsmtoken pause
    2025-02-18 14:24:12: [1960]: INFO: Preload running with: -c testOCS -f C:\preload\entrustsmtoken pause
    2025-02-18 14:24:12: [1960]: INFO: Created a (new) connection to Hardserver
    2025-02-18 14:24:12: [1960]: INFO: Modules newly usable: [1].
    2025-02-18 14:24:12: [1960]: INFO: Found a change in the system: an update pass is needed.
    2025-02-18 14:24:12: [1960]: INFO: Loading cardset: testOCS in modules: [1]
    
    Loading `testOCS':
     Module 1 slot 2: `testOCS' #2
     Module 1 slot 0: Admin Card #11
     Module 1 slot 3: empty
     Module 1 slot 4: empty
     Module 1 slot 5: empty
     Module 1 slot 2:- passphrase supplied - reading card
    Card reading complete.
    
    2025-02-18 14:24:16: [1960]: INFO: Stored Admin key: kfips (003e...) in module #1
    2025-02-18 14:24:16: [1960]: INFO: Loading cardset: Cardset: testOCS (edb3...) in module: 1
    2025-02-18 14:24:16: [1960]: INFO: Stored Cardset: testOCS (edb3...) in module #1
    2025-02-18 14:24:16: [1960]: INFO: Maintaining the cardset testOCS protected key(s)=[].
    2025-02-18 14:24:16: [1960]: INFO: Loading complete. Now pausing...
    If non-persistent cards are used, then the last card in the quorum must remain inserted in the card reader. If persistent cards are used, then the last card in the quorum can be removed from the card reader.
  6. Confirm the OCS or Softcard has been preloaded by opening a separate command window and running the following utility. The loaded Objects will be reported.

    • For K-of-N OCS:

      % preload.exe -c <cardsetname> -f <pathname>\<filename> nfkminfo
    • For Softcard:

      % preload -s <softcardname> -f <pathname>\<filename> nfkminfo

    For example:

    C:\Users\Administrator>preload -c testOCS -f C:\preload\entrustsmtoken nfkminfo
    2025-02-18 14:29:08: [316]: INFO: Preload running with: -c testOCS -f C:\preload\entrustsmtoken nfkminfo
    2025-02-18 14:29:08: [316]: INFO: Created a (new) connection to Hardserver
    2025-02-18 14:29:08: [316]: INFO: Modules newly usable: [1].
    2025-02-18 14:29:08: [316]: INFO: Found a change in the system: an update pass is needed.
    2025-02-18 14:29:08: [316]: INFO: Maintaining the cardset testOCS protected key(s)=[].
    2025-02-18 14:29:08: [316]: INFO: Loading complete. Executing subprocess nfkminfo
    ...
    Pre-Loaded Objects (  2):  objecthash   module objectid  generation
     003e04e3c07fb5791f651c992da5527779159f87   1 0x89fa8799 1
     edb3d45a28e5a6b22b033684ce589d9e198272c2   1 0x89fa8782 1

    Useful information concerning OCS:

    • You must present sufficient different OCS cards to fulfill the quorum.

    • The tokens file generated by the preload utility is valid for one continuous session only. If the session is lost, then the token authorization is lost. You cannot reuse the same token file once the session is lost, even if you use the exact same OCS cards again. To restart re-run preload.

    • A session, and token authorization is lost if:

      • There is a temporary power failure.

      • The window running preload is closed.

      • The last card in the quorum is removed if using non-persistent OCS cards.

    The tokens file represents a security risk if permissions to access it are not restricted to authorized persons only.

Configure the Entrust nShield Edge

If you are using an Entrust nShield Edge HSM continue in this section. Otherwise, proceeded to Configure the Entrust Certificate Authority.

The Entrust nShield Edge exhibits slower service startup times compared to the other Entrust nShield HSMs. In order to ensure optimal performance, increase the Entrust Certificate Authority timeout settings as follows.

  1. Navigate to the directory containing the entMgr.ini file, by default: C:\Program Files\Entrust\Certificate Authority\etc\ini.

  2. Edit the entMgr.ini file in the [login] section and add the following:

    serviceStartStopWaitSeconds=3600
    clusterStartWaitSeconds=1800
    clusterStopWaitSeconds=300

Configure the Entrust Certificate Authority

This section describes how to configure the Entrust Certificate Authority before it can be used. During configuration you provide the following:

  • Your directory and database connections parameters.

  • Your choice of certificate algorithms, lifetimes, and other options.

The configuration is stored in file C:\Program Files\Entrust\Certificate Authority\etc\ini\entMgr.ini which can be manually edited before committing.
  1. Navigate to the Certificate Authority \bin directory, by default C:\Program Files\Entrust\Certificate Authority\bin.

  2. Double-click entConfig.exe.

  3. In the Database Deployment Model window, select according to your setup. We selected Yes in this integration to use the Entrust Certificate Authority PostgreSQL database installed locally as described in install-certificate-authority.adoc#install-authority-database.

    entrust database deployment model
  4. In the Entrust Certificate Authority Configuration window, select Next.

  5. In the Certificate Authority License Information window, enter the Enterprise licensing information that appears on your Entrust licensing card. Then select Next.

    entrust licensing information
  6. In the Certificate Authority Data and Backup Locations window, enter your location or accept the defaults. Then select Next.

    • Data files: c:\authdata.

    • Backup files: c:\entbackup.

      entrust security manager data and backup locations
  7. In the Directory Node and Port window, enter your directory information. We used the directory described in directory-service.adoc#configure-directory-service. Then select Next.

    For example:

    entrust directory node and port
  8. In the CA Distinguished Name and Password window, enter your CA DN and CA Directory access password, then select Test Bind Information.

    entrustconfig2
  9. If the bind is successful, select OK. Otherwise, correct any errors in your directory settings using the Back button and retest. Then select Next.

  10. In the Directory Administrator Distinguished Name and Password window, enter your Directory administrator DN and Directory access password, then select Test Bind Information.

    entrustconfig3
  11. If the bind is successful, select OK. Otherwise, correct any errors in your directory settings using the Back button and retest. Then select Next.

  12. On the Advanced Directory Attributes window, enter the full DN of the first officer. Then select Next.

    entrustconfig5
  13. On the Verify Directory Information window, check Verify Directory information now. Then select Next.

    entrust verify directory information
  14. On the ENTDVT Logfile window, verify there are no errors in the Summary section. Correct any errors in your directory settings using the Back button before proceeding. Then select Next.

    entrust entdvt logfile
  15. On the Current User’s Windows Login Password window, log in with your Windows credentials. Un-check Enable autologin for automatic service startup. Then select Next.

    entrust current windows user password
  16. On the Database User and Password window, enter your database user credentials. Then select Next.

    entrust database user password
  17. On the Database Backup User and Password window, enter your database backup user credentials. Then select Next.

    entrust database backup user password
  18. On the Entrust Certificate Authority Port Configuration window, enter your information, then select Next.

    entrust security manager port configuration
  19. On the CA Type window, select the Root CA radio button. Un-check Root CA used as Single Point of Contact CA (SPOC), then select Next.

    entrust ca type
  20. On the Cryptographic Information window, select in each tab as follows. Select Next each time.

  21. On the Certification Authority Key Generation tab, select Use hardware.

    entrust chryptografic information
  22. On the CA Key Type tab, select the key type and length.

    entrust ca key pairtype
  23. On the Database tab, select the database encryption algorithm.

    entrust database encryption algorithm
  24. On the User Signing Key Type tab, select the key type and length.

    entrust signing nonrepudiation keys
  25. On the User Encryption Key Type tab, select the key type and length.

    entrust encryption dual usage keys
  26. On the CA Signing Algorithm Type tab, select the type.

    entrust signature algorithm
  27. On the Policy Certificate tab, enter the policy certificate lifetime.

    entrust policy lifetime

    For this integration to work with EC-P and RSAPSS, the ECC activation feature must be enabled for the Entrust nShield HSM. In the %NFAST_ HOME%\bin directory, run FET.exe.

  28. If you are using the Entrust nShield Edge, go to the step after next. Otherwise, the No Hardware Device Found dialog appears. Select OK.

    entrust no hardware devide found
  29. On the file explorer, select the nShield PKCS11 library %NFAST_HOME%\toolkits\pkcs11\cknfast.dll, default location C:\Program Files\nCipher\nfast\toolkits\pkcs11\cknfast.dll.

    entrust select library
  30. On the Use This Hardware window, select the Entrust nShield HSM, then select Next.

    choose hsm
  31. On the CRL Configuration window, select No, do not work with Microsoft Windows applications, then select Next.

    entrust crl configuration
  32. On the CRL Distribution Point Information window, select the CRL location, then select Next.

    entrust crl distribution
  33. On the CA Certificate Properties window, enter the CA certificate lifetime and private key usage period, then select Next.

    entrust ca certificate properties

    Consult your security policy of your organization about recommendations for CA lifetime.

  34. On the CRL Share Warning window, select OK.

    entrust crl share
  35. On the Configuration Complete window, check Run Entrust Certificate Authority Control Command Shell now to initialize the CA, then select OK.

    entrust complete configuration

    The Entrust Certificate Authority Control Command Shell (entsh) launches, and starts the CA initialization process.

    You will have the option to initialize the CA later by running the init command from the entsh command window.

  36. Enter and confirm the following passwords. Note these for future use.

    Parameter Value

    HSM

    OCS or softcard passphrase created in install-entrust-hsm.adoc#create-OCS-Softcard.

    Master1-3

    Master users new passwords

    First Officer

    First office new password

    For example:

    Starting First-Time Initialization...
    
    A Hardware Security Module (HSM) will be used for the CA key:
        nCipher Corp. Ltd  SN : edb3d45a28e5a6b2
        The HSM requires a password.
    
    Enter password for CA hardware security module (HSM):
    Enter new password for Master1:
    Confirm new password for Master1:
    Enter new password for Master2:
    Confirm new password for Master2:
    Enter new password for Master3:
    Confirm new password for Master3:
    Enter new password for First Officer:
    Confirm new password for First Officer:
    
    Initialization starting; creating ca keys...
    Initialization complete.
    Starting the services...
    Creating CA profile...
    Creating First Officer profile...
    You are logged in to Entrust Certificate Authority Control Command Shell.
    Performing database backup...
    SUCCESS: Full backup completed successfully.
    Press return to exit
  37. Close the window above.