Hi Lixin,

as long as you have only one realm and do not need any special setup, it is sufficient to add a new configuration item in config.d/democa/est/ with the expected settings. This will be automatically picked up when you use the name of the file as a EST ca label: /.well-known/est/<calabel>.

By example: Copy config.d/democa/est/default.yaml to config.d/democa/estcustom.yaml - change the "profile" entry and use  /.well-known/est/custom as URL for your EST client. Some clients will autocomplete the URL and only accept a "calabel" which ist "custom" in this case. If you need more control over the "outer" wrapper configuration, also create an appropriate file est/custom.conf - if this is not present, it will inherit from default.

HTH

Oliver

On 02.02.23 04:31, Lixin Liu wrote:
Hi Martin,

Sorry I am new to OpenXPKI product and still trying to learn how to customize 
to my need.

I am not sure how to define a new endpoint. Should I create a new ScriptAlias 
in Apache
configuration to, say /.well-known/user-est and then create a directory 
user-est with its
configuration in realm directory?

Could you provide an example how this is done?

I also had issue using user_auth_enc profile with EST and found the "enroll" 
style wasn't
defined in the user_auth_enc.yaml. Worked after I added it.

Thanks,

Lixin.

On 2023-02-01, 1:08 AM, "Martin Bartosch via OpenXPKI-users" 
<[email protected] <mailto:[email protected]>> 
wrote:


Hi,


I have only one CA, but is it possible to configure EST with 2 different 
profiles?
I would like to setup one for User certs. and one for TLS server certs.

Within any OpenXPKI PKI Realm you can configure an arbitrary number of EST, 
SCEP and RPC endpoints.


Each endpoint has its own distinct configuration, making it possible to provide 
endpoints, e. g. specific for a device group. (In terms of long term 
manageability this is an important feature, making it possible to modify the 
enrollment policy e. g. only for your printers while leaving the enrollment 
policy for phones unchanged.)


Each endpoint has a default certificate profile configuration which is selected 
if no other supported profile is requested by the client (and accepted by the 
endpoint).


The client may override the configured default profile by including the Microsoft specific 
extension 1.3.6.1.4.1.311.20.2 (szOID_ENROLL_CERTTYPE_EXTENSION, 
http://oid-info.com/cgi-bin/display?oid=1.3.6.1.4.1.311.20.2&action=display 
<http://oid-info.com/cgi-bin/display?oid=1.3.6.1.4.1.311.20.2&amp;action=display>) 
in the submitted CSR.


If the profile requested by the client is contained in the profile mapping of 
the endpoint configuration, the mapped profile is used for the incoming 
certificate request, otherwise the default is used.


HTH


Martin








_______________________________________________
OpenXPKI-users mailing list
[email protected] 
<mailto:[email protected]>
https://lists.sourceforge.net/lists/listinfo/openxpki-users 
<https://lists.sourceforge.net/lists/listinfo/openxpki-users>




_______________________________________________
OpenXPKI-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openxpki-users

--
Protect your environment -  close windows and adopt a penguin!



_______________________________________________
OpenXPKI-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openxpki-users

Reply via email to