Certificate Based Authentication
The CipherTrust Manager authenticates a user's login request by verifying the username and password against its internal database. The CipherTrust Manager can also be configured to authenticate login requests using browser-based web certificates. This section elaborates upon the steps that you need to perform to enable Certificate based Authentication for logging in the CipherTrust Manager.
Step 1: Enable the "Certificate based Login" Option for a User
Log on to CipherTrust Manager as an administrator. Navigate to Keys & Access management > Users.
Enable the "Certificate based Login" option for the user:
Specifying a Common Name (CN) is mandatory for this feature to work. The entities must be specified carefully in this field, and separated by commas (,).
For example:O=Thales,OU=CipherTrust,CN=User_1
If Distinguished Name (DN) field contains values that are separated by comma, then those values must be followed by a backslash (\
).Caution
For example:
C=IN,ST=UP,L=Noida,O=CompanyName\,INC,OU=ENC,CN=testFor existing users:
Click the action button for that user, then click Manage.
Click CONFIGURE CERTIFICATE LOGIN. Select Allow user to login using certificate.
Specify Certificate Subject Distinguished Name for the user.
Click Update Certificate Login.
For new users:
Click Create New User. Specify Username and Password for the user.
Select Allow user to login using certificate.
Specify Certificate Subject Distinguished Name for the user.
Click Create.
Step 2: Create and Download the Web Certificate
If using Local CA
Go to Keys & Access Management > CA.
Click Local Certificate Authority, and then click Create New Certificate.
Enter the Common Name for this certificate.
Note
This common name should be the same common name that was specified while creating the user ("User_1" in previous example).
Select desired algorithm (RSA or ECDSA).
In the Name field, specify the same details that were specified in the
certificate_subject_dn
property of the user.Click New Certificate, then click Save Private Key. The Save As window opens up.
Save the key (.pem file) in a secure location on your system.
Click Issue Certificate. The newly created certificate is now displayed in the certificate list.
Download this certificate, and save it in the same location where the Private Key is saved.
If using External CA
Upload the external CA.
Navigate to Admin Settings > System > Interface. The Interface Configuration page is displayed.
Click the action button on the Web Interface Configuration, select Edit.
Add the new external CA in the External Trusted CAs section. Click Update.
Navigate to Admin Settings > System > Services.
Restart the web service.
Note
Restarting the web service can take few seconds.
Step 3: Create and Install pkcs12 Formatted Certificate
Install OpenSSL on your machine.
Use the following command to convert the key and certificate into a pkcs12 formatted .pfx file:
openssl pkcs12 -export -out example.pfx -inkey key.pem -in certificate.pem
Where:
key.pem is the private key
certificate.pem is the certificate file
example.pfx is the pkcs12 formatted web certificate that will be installed in the web browser
This creates a .pfx certificate (example.pfx in the above command) at the same location.
Go to the web browser's settings.
Import and install the .pfx certificate.
You can now use the web certificate for logging on to CipherTrust Manager. Before logging on, you will be prompted to select the web certificate at the login page.
Note
After performing the above steps, if you are not prompted by the browser to select the certificate at login page, then clear your browser's cookies and try again.
Note
Currently, this feature is applicable to local users only. LDAP users are not supported.
Note
CipherTrust Manager verifies the revocation status of the certificate using the Certificate Revocation List (CRL) method before login. If the certificate is revoked, the CipherTrust Manager returns an unauthorized error message stating "cannot log in the user with a revoked certificate". In case, CRL URL is not reachable, then the CipherTrust Manager logs a message and lets the user login successfully.