From c2b2f0fffb4b77c2bbef95c7cfe69b02be34cd08 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Love=20H=C3=B6rnquist=20=C3=85strand?= Date: Thu, 4 Jan 2007 21:09:16 +0000 Subject: [PATCH] describe how to use hx509 to create certificates. git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@19708 ec53bebd-3082-4978-b11e-865c3cabbd6b --- doc/setup.texi | 54 ++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 54 insertions(+) diff --git a/doc/setup.texi b/doc/setup.texi index 30913634b..f6ee1a81b 100644 --- a/doc/setup.texi +++ b/doc/setup.texi @@ -1291,6 +1291,60 @@ lha@@EXAMPLE.ORG:CN=Love,UID=lha @subsection Using Kerberos database +@section Use hxtool to create certificates + +First you need to generate a CA certificate, change the --subject to +something appropriate, the CA certificate will be valid for 10 years. + +You need to change --subject in the command below. + +@example +hxtool issue-certificate \ + --self-signed \ + --issue-ca \ + --generate-key=rsa \ + --key="ca.key" \ + --subject="CN=CA,DC=test,DC=h5l,DC=se" \ + --lifetime=10years \ + --certificate="ca.der" +@end example + +The KDC needs to have a certificate, so generate a certificate of the +type ``pkinit-kdc'' and set the PK-INIT specifial SubjectAltName to the +name of the krbtgt of the realm. + +You need to change --subject and --pk-init-principal in the command below. + +@example +hxtool issue-certificate \ + --ca-certificate=FILE:ca.der,ca.key \ + --generate-key=rsa \ + --type="pkinit-kdc" \ + --pk-init-principal="krbtgt/TEST.H5L.SE@TEST.H5L.SE" \ + --key="kdc.key" \ + --subject="uid=kdc,DC=test,DC=h5l,DC=se" \ + --certificate="kdc.der" +@end example + +The users also needs to have a certificates, so generate a certificate +of the type ``pkinit-client''. Client doesn't need to have the PK-INIT +SubjectAltName set, you can have the Subject DN in the ACL file +(pki-mapping) instead. + +You need to change --subject and --pk-init-principal in the command below. + +@example +hxtool issue-certificate \ + --ca-certificate=FILE:ca.der,ca.key \ + --generate-key=rsa \ + --type="pkinit-client" \ + --pk-init-principal="lha@TEST.H5L.SE" \ + --key="user.key" \ + --subject="uid=lha,DC=test,DC=h5l,DC=se" \ + --certificate="user.der" +@end example + + @section Use OpenSSL to create certificates This section tries to give the CA owners hints how to create