Implementing PKI authentication
The BMC Server Automation Authentication Server can use public key infrastructure (PKI) to authenticate users who present a type of smart card known as a common access card (CAC). A BMC Server Automation client can access the appropriate certificate and private key on the smart card to authenticate the user through two middleware approaches:
ActiveClient
If you are using the ActiveClient middleware, the RCP console requests for an ActiveClient PIN to connect, as shown in the following figure:
90meter
For 90meter middleware, PKI configuration file Sunpkcs11.cfg is not created by default. To create the file use the following blcred command:blcred config pki -provider <path to the LitPKCS11.dll from the install directory>You can also create the file manually in the home directory (for example, on Windows 7, the location is: C:\Users\<username>\AppData\Roaming\BladeLogic) with following contents:
- name=CryptokiProvider
- library=c:\Program Files\90meter\CACPIVMD\pkcs11\x86\LitPKCS11.dll
- slotListIndex=0
Separate prompt for the PIN/password is not shown. Enter the Password on the login panel of RCP console to login successfully, as shown in the following figure:

To verify that a certificate is currently valid, the Authentication Server can access an OCSP Responder. By default, OCSP verification is enabled for PKI authentication. For more information about setting up OCSP, see Setting-up-certificate-verification-using-OCSP.
While logging into a BMC Server Automation client, the user must insert a smart card into a card reader and enter a PIN. If the information the user enters is valid and the OCSP Responder verifies the validity of the user's certificate, the Authentication Service issues the client a session credential.
BMC Server Automation does not provide a default set of trusted CA certificates for use with PKI authentication. If you are implementing PKI, you must obtain certificates from a CA.
For a procedure describing how to set up PKI authentication, see Configuring-PKI-authentication.