Hi everybody,

we are very pleased to announce that the first productive deployment  
of OpenXPKI has been performed on Friday last week! Although it is  
still somewhat limited in functionality, we are very excited to see  
OpenXPKI in action.

Some details about our use case:
In the current implementation phase we are using OpenXPKI only for  
one single purpose - it implements a self-service application for  
SmartCard personalization.

* System environment
SuSE Linux SLES 8, Oracle 9, nCipher nC1002W/nC3022W/nC4032W HSM,  
Apache 1.3, RSA Access Manager, RSA SID-800 tokens

* Authentication
For user authentication we are using a RSA token based Web Single- 
Sign-On solution implemented with RSA ClearTrust (now called RSA  
Access Manager). The web server configuration looks very much like a  
basic authentication in front of the web application, and it also  
sets some environment variables that the application can evaluate to  
obtain login user information.

* Authorization
The OpenXPKI authorization configuration for users is using an  
"External Static" that only calls /bin/true and sets the role "User".  
(The actual authentication is performed by the authentication module  
configured in the web server config.)
RA and CA operator authentication also works via the SSO mechanism.  
However, the logged in user can pick "RA Operator" or "CA Operator"  
instead of "User". The configuration is again "External Static" but  
in this case it calls a shell script which checks the authenticated  
user name against LDAP groups that list acceptable RA/CA operators.
If authorized, the user gets the corresponding role for the rest of  
the session.

* SmartCard personalization
Currently the application uses the SmarCard Personalization workflow  
as shipped in rev 709.
A User can either login normally to the application and pick  
"Personalize SmartCard" from the top level menu. However, using  
mod_rewrite we configured a rewrite rule for https://servername/token  
to a deep link into the application. It directly starts the  
personalization workflow and hides the user menu.
The workflow queries user data from an LDAP directory and stores the  
required fields in the workflow instance context.
The user is then prompted to insert a SmartCard token. If the correct  
Crypto Service Provider is installed (and the user is using MS  
IE...), a key pair is generated on the token. The browser sends the  
CSR to OpenXPKI which inserts the CSR into the workflow.
The HSM-protected CA key is usually always online, so certificate  
issuance can happen right away. The personalization workflow forks a  
certificate issuance workflow and waits for its completion. Once the  
certificate is issued the workflow continues and instructs IE to  
install the certificate on the user's token.
In fact we are generating two certificates per user, both are  
requested and installed in the same session. Due to the low speed of  
the used SmartCard tokens the full personalization process takes  
about 4 minutes.

Thanks to all who helped,

Alex and Martin



-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys - and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
OpenXPKI-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openxpki-users

Reply via email to