3.6 Configuring end entity profiles
The following restrictions are imposed on configuring end entity profiles that are used for issuing certificates to users to ensure that MyID can manage certificates using the CA.
Configuration Field |
Purpose |
Recommended Setting |
---|---|---|
Username |
Controls if the username for the end entity is automatically generated. |
Disable auto-generated MyID provides the username based on the end entity profile name. |
Password (Enrolment Code) |
Password is used for key and certificate recovery. |
Disable auto-generated Enable the Required option for profiles being used for key escrow certificates, as a password is required to recover the server-generated keypair. Passwords are not required for non-key escrow certificates, as certificates issued using the profile do not need to be recovered. |
Maximum number of failed login attempts |
Used when the EJBCA is also validating login attempts using the configured password. |
Disable
|
Batch generation (clear text pwd storage) |
Password is used to authenticate PKI requests. |
Disable |
End Entity E-mail |
Email is used for notifications. |
Disable The EJBCA is not used for sending notifications. |
Subject DN Attributes |
Controls which DN attributes can be configured in the Subject DN. This configuration is used to populate the certificate policy extensions in MyID. |
See section 3.9.3, Additional attribute settings. For each attribute:
When configuring an End Entity profile for key escrow certificates or when using a certificate profile that uses the Subject DN supplied in the certificate request, the Subject DN components must cater for any DN components that are required for the certificate. Any DN components that are not specified in this section will not be supplied in the certificate request. Where the supplied subject DN may contain repeated DN components, the number of such components, configured in the profile, must be greater than or equal to the maximum number of such components. For example, if the supplied DN could have three OU components, the profile must also have at least three OU components. |
Other Subject Attributes |
Controls which SAN and Subject Directory attributes are required to be configured in this certificate policy. This configuration is used to populate the certificate policy extensions in MyID. |
As for Subject DN Attributes. When adding RFC 822 Name attribute, the Use entity e-mail field option is automatically enabled and the Modifiable option is disabled. An email address is not set for an end entity and therefore you must disable the Use entity e-mail option. The Modifiable option must also be enabled but initially this may remain disabled; in this case, you must save the profile setting and then re-edit the profile to set the Modifiable option. |
Default Certificate Profile |
The certificate profile used if a certificate profile is not specified in the certificate request. |
MyID does not specify the certificate profile in the received certificate request, therefore the default certificate profile is used. |
Available Certificate Profiles |
Controls which certificate profiles can be used in a certificate request using this profile. |
You can leave this list unselected, as the default certificate will be added even if it has not been selected. |
Available CAs |
Determines which CAs can use this certificate profile for certificate issuance. |
Must at least select the CA selected in the certificate profile referenced by this profile. Ensure that the profile does not reference a CA, including the default CA, that is not referenced by the referenced certificate profile. |
Default Token |
Controls the types of certificates that may be issued using this profile. |
Must select User Generated. Must also select P12 token for key escrow certificate policies. |
Key recoverable |
Identifies that the profile can be used to recover the server-generated encryption keys. |
Check Use if the profile is to be used for issuing key escrow certificates; otherwise, leave this option unchecked. When Use is checked, you must also check the following to prevent additional certificates being created unnecessarily: Default and Reuse old certificate. |
Send Notifications |
Notification is sent when a certificate is available for collection. |
Leave unset PrimeKey EJBCA CA must not be used for sending notifications. |
Note: For the Key Management End Entity, you must make sure that the minimum password strength is set to a value higher than 0. If you set the minimum password strength to 0, the key management certificate does not issue.
3.6.1 Certificate Request Subject DN generation
MyID automatically generates the subject DN for the certificate request using any configured certificate policy attributes and the supplied user DN. Where the same DN component is present in both the certificate policy attribute and the user DN, the attribute supplied in the attributes takes priority. Only those subject DN components that have been configured as being allowed in the corresponding End Entity Profile will be included in the generated subject DN.