Page History
Table of Contents |
---|
Introduction
The built-in certificate authority Certificate Authority available from JOC Cockpit offers the functionality
- to create a Root CA private key and certificate, to self-sign the Root CA certificate,
- The Root CA private key and certificate are stored with the JS7 - Database.
- to create private keys and certificates per Controller and Agent instance, to sign the resulting certificates.
- The private keys and certificates are not stored with the JS7 database, instead, they are requested by Controller and Agent instances, are created on-the-fly and are forwarded to the requester.
- to create security tokens that allow Controller instances and Agents to authenticate their request for a private key and certificate.
- Security tokens are applied during JS7 - Certificate Authority - Rollout Certificates for HTTPS Connections.
- Security tokens are created for one-time use, they are invalidated after being used a single time or if their lifetime is exceeded.
...
The JS7 - Profiles offer the JS7 - Profiles - SSL Key Management sub-view to user accounts that are assigned the administrator role. To be more precise this sub-view is available to user accounts that are assigned the sos:products:joc:adminstration:manage
role, see JS7 - Default Roles and Permissions.
Explanation:
- Operations offered from this sub-view include
- to generate the Root CA private key and certificate and to self-sign the certificate,
- to import and to update the private key and self-signed certificate in case that they are generated by an external Certificate Authority.
- Consider that updates to the Root CA private key and certificate require new private keys and certificates for Controller instances and Agents to be created.
- Existing private keys and certificates remain in place with Controllers and Agents, they continue to work but cannot be verified by a user.
- It is therefore recommended to create and to rollout new private keys and certificates within a foreseeable time.
- JOC Cockpit supports ECDSA key algorithms only as RSA key algorithms are not considered secure for the future.
...
As a result the Controller or Agent instance is equipped with an a TLS/SSL certificate and is ready to accept HTTPS connections.
The User->Manage Controllers/Agents menu of JOC Cockpit offers to create security tokens for Controller and Agents Agent instances individually:
- You can use the Controller's action menu to create one-time security tokens for Controller instances.
- You can select one or more Agents to create one-time security tokens per Agent. Then , then use the Create one-time Token button.
- After selection of the Controller or Agents a popup window is displayed that asks for the lifetime of the token.
...
- The security token is valid until its lifetime expires.
- It is recommended to use short lifetimes such as 30 minutes that are sufficient to perform the steps for roll-out rollout of certificates to the respective Controller and Agents.
- The lifetime is specified for a time zone as the user browser's time zone and the time zone of the server operating a Controller instance or Agent might differ.
- Security tokens become invalid after one-time use. Cleanup of expired security tokens is performed automatically by JOC Cockpit.
- Once the security tokens are generated they are visible from the user interface.
...