- Created by Karolin Hemmingsson, last modified by Ann Base on Jun 10, 2021
The default request URL for EST is as follows. For more information, see EST URI configuration. Relative paths specified below are relative the <configroot>. Controls if the EST servlet should start or not. contains a filter for the handler part of the URL specified as a regular expression. optional, enables HTTP Basic/Digest authentication by specificing the desired authentication type. May only be set for filters simpleenroll and simplereenroll. Example: handler.<n>.authtype = Basic handler.<n>.authtype = Digest The parameter values in the default section are used by all handlers unless overridden in the handler section. Each EST endpoint requires its own handler. The endpoint Note that requests that do not comply with the answer from To configure a token procedure that is compatible with See example configuration above. Protocol Gateway supports multiple token procedures and thereby multiple CAs. To support multiple CAs, subpaths can be added with different token procedures: The configuration in coap.properties must be adapted so that only the correct endpoints are exposed through the CoAP Proxy. For more information, see coap.properties. CoAP endpoints should use the formats with estcoaps- prefixes. See also EST over CoAPs support in Certificate Manager and coap.properties.http://<pgwy-host>:<port>/pgwy/est[/<handler>]
%ALLUSERSPROFILE%/Nexus/cm-gateway/
/var/cm-gateway/
Parameters
Parameter Description start start = false
filter format contains the name of a format definition file. For regular EST the format definition files with the prefix est- should be used. For EST over CoAPs the files with the prefix estcoaps- should be used instead. tokenprocedure contains the description or id of a token procedure in the CM server. ra.keyfile is the token to sign the fullcmc responses. Not required if fullcmc is disabled. ra.password is the password to the keyfile. It is recommended to obfuscate sensitive data with .encrypted. requiredRoRoles optional, contains a space or comma separated list of required Registration Officer roles. This requires client authentication to be enabled in Tomcat, and verifies that the client certificate is an officer. If the role none is entered, the client certificate must be issued by CM but does not need to be an officer. "/cacerts" must not be protected behind client authentication, and therefore no default role should be set. authtype realm required if authtype is set, may be empty. Determines which realm the login should occur on. Can only be set for filters simpleenroll and simplereenroll. qop optional, determines the quality of protection used with Digest authentication. Valid value is auth. If not specified then no Quality of Protection will be required. idm.requestUrl optional, request URI of IDM instance to register the request. May only be set with format est-simpleenroll-idm. idm.tls.token required if idm.requestUrl is set, file path to the PKCS#12 file to be used to authenticate to IDM. idm.tls.password required if idm.tls.token is set, password for the PKCS#12 token as specified in parameter idm.tls.token. Define handlers
default.format = est-simpleenroll
default.tokenprocedure = TLS Client Token
handler.0.filter = cacerts
handler.1.filter = simpleenroll
handler.1.format = est-simpleenroll
handler.1.requiredRoRoles = cert.issue
handler.2.filter = simplereenroll
handler.2.format = est-simplereenroll
handler.2.requiredRoRoles = none
# Controls if the client TLS certificate must match the latest issued certificate
# for the requested subject. Set to false as default.
# handler.2.allowRenewalWithOldCertificates = false
handler.3.filter = fullcmc
handler.3.format = est-fullcmc
handler.3.requiredRoRoles = cert.issue
# fullcmc responses require an RA token to be signed with
handler.3.ra.keyfile = protocol-gateway-ra.p12
handler.3.ra.password = abcd1234
handler.4.filter = serverkeygen
handler.4.format = est-serverkeygen
handler.4.requiredRoRoles = cert.issue
handler.4.tokenprocedure = TLS Client Token Generate Key
handler.5.filter = csrattrs
# Csrattrs requires a filepath relative to the PGWY config root to a file
# with the expected attributes
handler.5.filepath = est_csrattrs.txt
About CSR attributes
/csrattrs
requires a text file that defines what Object Identifiers (OIDs) that are required by the CA. The filepath is configured in est.properties and the syntax for the file is one OID per line. See example configuration above. /csrattrs
might still be accepted.About Server key generation configuration
/serverkeygen
, make sure that the following requirements are satisfied:Key management archive
and format generate
must be added.Example: Multiple CAs
#handler.20.filter = otherpath/cacerts
#handler.20.tokenprocedure = anotherTokenProcedure
Example: CoAP endpoints
#handler.21.filter = otherpath/sen
#handler.21.format = estcoaps-simpleenroll
#handler.21.tokenprocedure = anotherTokenProcedure
#handler.21.requiredRoRoles = cert.issue
This article is valid for Certificate Manager 8.4 and later.
Related information
- Set up and use test clients in Protocol Gateway
- Configuration files in Protocol Gateway
- Scramble sensitive data in configuration files in Protocol Gateway
- Certificate request verifications in Protocol Gateway
- Device preregistration for automated enrollment
- Use CMP or SCEP protocol in CA mode