Configure the Entrust Timestamping Authority

The following steps are described in detail in the Entrust Timestamping Authority 2.1 Deployment Guide, section Configuring Entrust Timestamping Authority.

  1. Present the OCS to the HSM if using OCS protection. The OCS must be presented in slot 0 which means: insert the OCS in the HSM front panel reader, or map the TVD to slot 0 as described in Map dynamic slots to slot #0

  2. On a web browser navigate to https://<machine>/management-console, where <machine> is the EDM hostname or IP address. Log in as a user with Timestamping Authority management permissions, for example admin.

  3. On the Timestamping Authority icon, select Manage Solution.

  4. Select Configuration.

  5. Active Enable Advance Configuration. Then select Next.

    enable advance configuration
  6. In the HSM tab, in the vendor pull-down menu, select nShield. Enter the token name and passphrase. For Number of sessions, the default 64 was used. Then select Next.

    hsm configuration tab
  7. In the TSA Server tab, make you selection. Defaults were used. Then select Next.

  8. In the Clock Service tab, make you selection. Defaults were used. Then select Next.

  9. In the TSA Issuers tab, select the + TSE Issuers icon.

  10. Enter the issuer ID or name.

  11. In TSA certificate, select the tsa-signed-cert.cer file created in integrate-nshield-timestamping-auth.adoc#sign-csr.

  12. In CA Chain, select the chain.pem file created in integrate-nshield-timestamping-auth.adoc#export-root-ca.

  13. In Policy ID, enter the RFC 3161 Time-Stamp Protocol (TSP) object identifier values of 1.3.6.1.5.5.7.3.8.

  14. The default values were selected for the other fields in this window. Then select Validate.

    tsa issuer tab
  15. Upon no validation errors, select Submit.

  16. Upon no submissions errors, select Deploy. Then select Yes.

    deploy tsa
    deployment progress

Example of a successful deployment:

successful deployment