Configuring System A as a certificate authority

 

Use this procedure to configure System A as a certificate authority (CA).

  1. In a Web browser, type http://systema:2001. This launches the Task Page that allows you to access the Digital Certificate Manager (DCM) interface.

  2. Log on with your System A user profile name and password.

  3. Select Digital Certificate Manager.

  4. From the left navigation pane, select Create a Certificate Authority (CA).

  5. On the Create a Certificate Authority (CA) page, fill in the following required fields with the information from the DCM planning worksheet:

  6. Click Continue.

  7. On the Install Local CA certificate page, click Continue.

  8. On the Certificate Authority (CA) Policy Data page, select the following options:

  9. On the Policy Data Accepted page, read the messages that are displayed and click Continue to create the default server certificate store (*SYSTEM) and a server certificate signed by your CA. Read the confirmation message and click Continue.

  10. On the Create a Server or Client Certificate page, enter the following information:

  11. Click Continue.

  12. On the Select Application page, click Continue.
    Tip: The VPN New Connection wizard automatically assigns the certificate you just created to the i5/OS® VPN key manager application. If you have other applications that might use this certificate, you can select them on this page. Because this scenario only uses certificates for VPN connections, there is no need to select any additional applications.

  13. On the Application Status page, read the messages that are displayed and click Cancel. This accepts the changes that you created.

    If you want to create a certificate store to contain certificates that are used to sign objects, select Continue.

  14. When the DCM interface is refreshed, select Select a Certificate Store.

  15. On the Select a Certificate Store page, select *SYSTEM. Click Continue.

  16. On the Certificate Store and Password page, enter secret. Click Continue.

  17. In the left navigation frame, select Manage Applications.

  18. On the Manage Applications page, select Define CA trust list. Click Continue.

  19. On the Define CA Trust List page, select Server. Click Continue.

  20. Select i5/OS VPN Key Manager. Click Define CA Trust List.

  21. On the Define CA Trust List page, select LOCAL_CERTIFICATE_AUTHORITY. Click OK.

 

Parent topic:

Setting up certificate authority with Digital Certificate Manager
Previous topic: Starting IBM HTTP Server for i5/OS on System A