Implementing PKI authentication
The TrueSight Server Automation Authentication Server can use public key infrastructure (PKI) to authenticate users who present a type of smart card known as a common access card (CAC). A TrueSight Server Automation client can access the appropriate certificate and private key on the smart card to authenticate the user through two middleware approaches:
ActivClient
If you are using the ActivClient middleware, the TrueSight Server Automation console requests for an ActivClient PIN to connect.90meter
For 90meter middleware, PKI configuration file Sunpkcs11.cfg is not created by default. To create the file use the following blcred command:blcred config pki -provider <path to the LitPKCS11.dll from the install directory>You can also create the file manually in the home directory (for example, on Windows 7, the location is: C:\Users\<username>\AppData\Roaming\BladeLogic) with following contents:
- name=CryptokiProvider
- library=c:\Program Files\90meter\CACPIVMD\pkcs11\x86\LitPKCS11.dll
- slotListIndex=0
Separate prompt for the PIN/password is not shown. Enter the Password on the login panel of TrueSight Server Automation console.
To verify that a certificate is currently valid, the Authentication Server can access an OCSP Responder. By default, OCSP verification is enabled for PKI authentication. For more information about setting up OCSP, see Setting-up-certificate-verification-using-OCSP. While logging into a TrueSight Server Automation client, the user must insert a smart card into a card reader and enter a PIN. If the information the user enters is valid and the OCSP Responder verifies the validity of the user's certificate, the Authentication Service issues the client a session credential.
TrueSight Server Automation does not provide a default set of trusted CA certificates for use with PKI authentication. If you are implementing PKI, you must obtain certificates from a CA.
For a procedure describing how to set up PKI authentication, see Configuring-PKI-authentication.