Implementing PKI authentication
The TrueSight Server Automation Authentication Server can use public key infrastructure (PKI) to authenticate users who present a type of smart card known as a common access card (CAC). A TrueSight Server Automation client can access the appropriate certificate and private key on the smart card to authenticate the user through two middleware approaches:
ActivClient
For ActivClient middleware, if the PKI configuration file, sunpkcs11.cfg does not exist, use the following blcred command to create the file:blcred config pki -provider <path to the 64-bit acpkcs211.dll from the install directory>
Starting from version 21.3, the provider argument is mandatory.You can also create the file manually in the home directory (for example, on Windows 7, the location is: C:\Users\<username>\AppData\Roaming\BladeLogic) with following contents:
- name=CryptokiProvider
- library=c:\Progra~1\ActivIdentity\ActivClient\acpkcs211.dll
Provide full path to the acpkcs211.dll file. - slotListIndex=0
slotListIndex is the slot id where smart card is inserted. Typically it is 0, but in some cases where more than one smart cards are inserted on the server, it could be 1 or more also.
If you are using the ActivClient middleware, the TrueSight Server Automation console requests for an ActivClient PIN to connect.
90meter
If the PKI configuration file, sunpkcs11.cfg does not exist, use the following blcred command to create the file:blcred config pki -provider <path to the 64-bit LitPKCS11.dll from the install directory>
Starting from version 21.3, the provider argument is mandatory.You can also create the file manually in the home directory (for example, on Windows 7, the location is: C:\Users\<username>\AppData\Roaming\BladeLogic) with following contents:
- name=CryptokiProvider
- library=c:\Program Files\90meter\CACPIVMD\pkcs11\x86\LitPKCS11.dll
Provide full path to the LitPKCS11.dll file. - slotListIndex=0
slotListIndex is the slot id where smart card is inserted. Typically it is 0, but in some cases where more than one smart cards are inserted on the server, it could be 1 or more also.
Separate prompt for the PIN/password is not shown. Enter the Password on the login panel of TrueSight Server Automation console.
To verify that a certificate is currently valid, the Authentication Server can access an OCSP Responder. By default, OCSP verification is enabled for PKI authentication. For more information about setting up OCSP, see Setting-up-certificate-verification-using-OCSP. While logging into a TrueSight Server Automation client, the user must insert a smart card into a card reader and enter a PIN. If the information the user enters is valid and the OCSP Responder verifies the validity of the user's certificate, the Authentication Service issues the client a session credential.
TrueSight Server Automation does not provide a default set of trusted CA certificates for use with PKI authentication. If you are implementing PKI, you must obtain certificates from a CA.
For a procedure describing how to set up PKI authentication, see Configuring-PKI-authentication.