SECURING
Because server administrators and clients use browsers to access the CA server to request and pick up certificates, use TLS to protect the CA server. When you set up the CA server for TLS, you create the server key ring file and request a server certificate. Domino® automatically approves the server certificate and merges the CA certificate as a trusted root.
About this task
For information on approving server certificate requests for Domino servers that are not CA servers, see the related topic Signing server certificates.
Note: There are cases when you might want to use the Domino 5 certificate authority, for example, if you want to set up Domino for TLS using a third party certificate. For more information, look in the related topics for the technote Setting up a Domino 5 certificate authority.
Parent topic: Domino server-based certification authority
To set up TLS on a server-based CA server
Procedure
1. Create an Internet certifier.
2. Create the Certificate Requests application (CERTREQ.NSF).
3. Do the following to create a server key ring file to store the server certificate, and merge the CA certificate as a trusted root into the server key ring file:
b. In the Create Key Ring form, complete these fields:
c. Verify the information in the Key Ring Created dialog box, then click OK to add your CA as a trusted root and generate a certificate request for the server.
d. Verify the information in the Merge Trusted Root Certificate Confirmation dialog box and click OK.
e. When the Certificate received into key ring and designated as trusted root confirmation dialog box appears, click OK.
f. When the Certificate Request Successfully Submitted for Key Ring dialog box appears, click OK.
If you chose Automatic as the processing method used by the Certificate Requests database, continue with Step 5. If you chose Manual, then complete Steps 4 through 6.
b. If the request status is Submitted to Administration Process, continue with Step 5. If the request is still Pending, highlight the request and click Submit Selected Requests.
c. When you see Successfully submitted 1 request(s) to the Administration Process, click OK.
b. Open the request and verify the information in it.
c. Click Edit Request, then Approve Request. Press F9 until the request changes to Issued.
b. Open the Pending/Submitted Certificates view and locate the request. If necessary, refresh the view.
c. If the certificate has not yet been issued, click Pull Selected Request(s).
c. Enter the key ring file name and password, paste the pickup ID into the form, and click Pickup Certificate.
b. When the Certificate received into key ring confirmation appears, click OK.
c. Copy or use FTP (in binary mode) to transfer the new key ring file and its associated .sth file to the server's data directory.
c. To show TLS status and to verify that the HTTP server is listening on both 80 and 443, type te http show security at the server console.
c. Click More Info to verify the information, then clickNext.
d. Decide whether or not to accept the new site certificate, and for how long, then clickNext.
e. Decide whether or not you want to see a warning every time you access the new site, then click Next. When the dialog box appears, clickFinish.
If the Security indicator (a padlock icon) is closed (locked), you have successfully established a secure session over TLS.
Related concepts TLS security
Related information