Previous Page: Using Third-Party Certificates  Next Page: Using Cross-Domain Authentication

Using Multi Certificate Authorities

The Multi CA feature enhances authentication to support alternate Certificate Authorities (CAs) during mutual SSL authentication. The Multi CA feature allows the iChain proxy to accept user certificates that are signed by a different CA than the CA that signed the iChain server certificate.

For example, if your iChain server certificate is signed by a VeriSign CA, then using the Multi CA feature could allow users with certificates signed by a Baltimore CA or an Entrust CA to access your system (the Baltimore or Entrust certificates would need to be installed into your LDAP server tree).


Configuring Multi CAs

To configure Multi CAs, you need to place the alternate CA certificates into your LDAP tree, configure the iChain proxy to use a specified trusted root container, and create new iChain server certificates, as described below in Task One: Place Alternate CA Certificates Into Your LDAP Tree, Task Two: Configure the iChain Proxy Server to Use a Specified Trusted Root, and Task Three: Create New iChain Server Certificates.


Task One: Place Alternate CA Certificates Into Your LDAP Tree

To place the alternate CA certificates into your LDAP tree:

  1. From ConsoleOne, select the Security object located at the root of your LDAP tree.

  2. Select File > New > New Object

    or

    Click the New Object icon.

  3. Select NDSPKI:Trusted Root > click OK.

  4. Define a name for the trusted root container (for example, iChain Roots) > click OK.

  5. Select the object you just created (for example, the iChain Roots object).

  6. Select File > New > New Object

    or

    Click the New Object icon.

  7. Select NDSPKI:Trusted Root Object > click OK.

  8. Define a name for the trusted root object (for example, Baltimore CA) > click OK.

  9. Select the Read from File button > browse your system for the trusted root certificate > import it into the dialog box

    or

    Paste your trusted root certificate into the dialog box. To use this option, you must first open the trusted root certificate in a text editor or some other program and copy the contents to the clipboard. Then right-click inside the box and select Paste. Your certificate will be inserted into the dialog box.

  10. Click Finish.

    If you want to add more trusted root certificates, repeat Step 5 through Step 10 for each certificate.


Task Two: Configure the iChain Proxy Server to Use a Specified Trusted Root

To configure the iChain proxy to use a specified trusted root container:

  1. From ConsoleOne, click the Other tab on the iChain Security object (ISO) you previously created for this configuration.

  2. Click Add.

  3. Click iChainTrustedRootContainer > click OK.

  4. Using the Browse button, browse to the trusted root container previously created (see Task One: Place Alternate CA Certificates Into Your LDAP Tree) > click OK.

    or

    Enter the complete name of the previously created trusted root container (for example, iChain Roots.Security).

  5. Click OK.


Task Three: Create New iChain Server Certificates

Only iChain server certificates created or restored after Task One: Place Alternate CA Certificates Into Your LDAP Tree and Task Two: Configure the iChain Proxy Server to Use a Specified Trusted Root will have the Multi CA feature enabled. Therefore, you need to perform one of the following tasks to enable Multi CA support:



  Previous Page: Using Third-Party Certificates  Next Page: Using Cross-Domain Authentication