KEK GRID CA Enrollment Manual
Version 5.1
2021-12-08 Index
1. CA Service Application (KEK GRID CA CP/CPS 4.1(1))
1.1. Submitting Application Form
Users can request a KEK Grid CA service account via the Online Application Portal, ccPortal (highly recommended). All users must submit an application form and a copy of the user's (high resolution) photo ID to the Administration Office of the KEK Computing Research Center by the system. It is desirable that the user's photo ID is issued by the user's home institute. If it is not possible, a copy of your ID from the home institute in addition to one copy of a public photo ID can be submitted instead. Your personal information (including a copy of photo ID) is used exclusively for the purpose of managing your account and issued certificates, and in particular, vetting your identity by a face-to-face or video conferencing interview.
In case a user cannot utilize ccPortal for any reason, the application form and photo ID can be sent by e-mail or ordinary mail in the paper.
[English]
The template of the application form is available from Application Form Page.
1.2. Identification and Interview
After receiving an application form, KEK GRID RA examines it according to CP/CPS document [3.1.9 user identification], and interviews the applicant. The interview is scheduled based on an agreement between the RA and the applicant. The interview can be either face-to-face or through video conference.
1.3. Authorization
If the application is approved by the interview, the KEK GRID RA will inform the KEK GRID CA that the request has been approved. The KEK GRID CA then creates a username and a password, which will be used to obtain a certificate from the CA system. The initial password is set to 10 digits random characters. The username and the initial password will be able to retrieve from ccPortal. If a user is not registered in ccPortal, a document will be sent to the applicant in a paper by ordinal mail or FAX. You should change the initial password as soon as you receive it and keep in mind your changed password.
2. Managing User Account
2.1. Change User's PasswordTo change your password, visit Password Management Service with your favorite web browser. The KEK GRID CA requires a user to keep her/his password more than 10 digits long. 2.2. Change User's Common NameIf you want to change your Common Name (CN), please contact consult@kek.jp.
3. Setting up Command Line Client
User must install KEK GRID CA Command Line Client (CLI) on a computer system client nod client node.
The CLI communicates with the KEK GRID CA through the public Internet.
3.1. KEK GRID CA CLI InstallationOn KEKCC work servers, the CLI is pre-installed under /opt/kek/caclt. User have to install a CLI package which is a modified version of the NAREGI-CA software. The NAREGI-CA software supports various UNIX platforms, however, the CLI has been tested on following Linux platforms only:
After downloading the CLI package, you can install it in the following way (You can change the installation directory ("/opt/kek/caclt" in the example below) to whatever you like. The default is "/usr/local".):
4. Obtaining a Certificate
4.1. Obtain a User Certificate with KEK GRID CA CLI
The following files should be created under current working directory:
You have to set appropriate permissions on userkey.pem (400) and usercert.pem (644). Under usual Grid environment, these files are supposed to be placed in $HOME/.globus directory. 4.2. Obtaining a Host/Service Certificate
In order to issue host/service certificates, a special permission has to be given to your account.
4.2.1. Generation of One-time License CodeA one-time license is required to request issuing a Globus host/service certificate. You can get it with a web browser which supports a HTML form submission:
4.2.2. Obtain Certificates with KEK GRID CA CLI
Execute "certreq" with the options below
or $ /opt/kek/caclt/bin/certreq issue -lic a_onetime_license_code -lcert -fqdn hostname "-fqdn hostname" is a mandatory option when you obtain host/ldap certificates.
If you want to have a 2nd organizational unit (OU) field in the subject of a host/ldap certificate, you should execute "certreq" with the following options;
The following files will be created under current working directory:
Please note that certreq overwrites certificates and key files (hostcert.pem and hostkey.pem or ldapkey.pem and ldapcert.pem) in current working directory. You have to set appropriate ownership (usually root) and permissions on hostkey.pem (400) and hostcert.pem (644). Under usual Grid environment, these files are supposed to be placed in /etc/grid-security/ directory. 5. Updating CertificatesCertificates can be updated by either (5.1) rekeying or (5.2) revoking old one and then issuing new one.5.1. Rekey certificatesFor user certificate:You can rekey your certificate, i.e. issue a new one with the same subject as the current one if the certificate will expire in less than 90 days. Note that the old certificate is valid until the expiration date and you will receive email notifications until the old certificate expires or is revoked. (The old certificate can be revoked from the Web enroll page as described in Section 6.2.)
You can rekey your certificate, i.e. issue a new one with the same subject as the current one if the certificate will expire in less than 90 days. Note that the old certificate is valid until the expiration date and you will receive email notifications until the old certificate expires or is revoked. (See Section 6 for revocation of the certificate.)
5.2. Revocation and ReissuanceYou can revoke the old certificate and reissue new one with following steps:6. Revoking Certificates
There are two ways to revoke a certificate. 6.1. Using KEK GRID CA CLI
"certreq" command has a function to revoke a certificate. Revocation using the CLI needs a set of files as below:
You need to specify relative/absolute file names if these are not in current working directory:
6.2. Using Web BrowserYou can revoke an issued certificate at the KEK GRID CA service with a web browser.
Detailed procedures are illustrated in Revocation of User certificate and Revocation of Host certificate
i. Appendix A: Converting a CertificateTo import a certificate into browsers, the certificate should be in PKCS12 encrypted form.You can convert the certificate by using openssl command as follows: $openssl pkcs12 -export -in usercert.pem -inkey userkey.pem -out user.p12where user.p12 is the name of your converted file. In this command, you will be prompted for Pass Phrase and Export Password. Pass Phrase is the pass phrase of your key file. Export Password is the password for exporting the certificate to browsers. The PKCS12 file can be converted to the PEM files by using the following openssl commands: $openssl pkcs12 -in user.p12 -clcerts -nokeys -out usercert.pem $openssl pkcs12 -in user.p12 -nocerts -out userkey.pem ii. Appendix B: Import a Certificate to BrowsersThis section shows how to import the certificate (in p12) to your browsers. Several combinations of major browsers and OSes are covered here.= Internet Explorer 11 (Windows 10) open Tools -> Internet Options, click Content under Certificates, click Certificates, click Personal click import = Firefox 77.0.1 (Windows 10) open Options, click Advanced, click Certificates, click View Certificates, click Your Certificates click import and enter the filename = Firefox 68.9.0 (Linux) open Edit -> Preferences, click Advanced, click Encryption under Certificates, click View Certificates, click Your Certificates click import and enter the filename = Firefox 13.0 (Mac OS X) open Firefox -> Preferences, click Advanced, click Encryption under Certificates, click View Certificates, click Your Certificates click import and enter the filename = Chrome 96.0.4664.110 (Linux, Windows) open Settings --> Privacy and security --> Security --> Manage Certificate click import and enter the filename = Safari 5.1.7 (MacOS X Lion) Doubleclick your certificate file (.p12) or open Terminal (Application -> Utility -> Terminal), then type "open [your-cert-file (in .p12)]" (Keychain Access is invoked,) enter the password (passphrase) (With Keychain Access (Application -> Utility -> Keychain Access), you should have the certificate in your login keychain.) Powered by NAREGI CA Ver 3.3 User Enroll Service modified by KEK. |