Cookies are used to collect information about you. Nexus uses this information to give you a better experience of the website (functional) and to count the pages you visit (statistics).
Click OK to give Nexus your consent to use cookies. Read more about Nexus' cookie policy.
This article is valid for Certificate Manager 8.5 and later.
This article describes how to do initial configuration of Protocol Gateway, using the provided enrollment templates file.
This instruction includes configuration of VRO and TLS parameters for connection and communication with the CM server. This is configured in cm-gateway.properties and determines the following:
The DNS name or IP address of the CM server.
The name and location of the Protocol Gateway officer token.
The TLS trust store location.
The SNI (Server Name Indication) host name of CM (Optional), see heading "Configure TLS Server Name Indication (SNI) parameter" below.
In File for Media, select the path and filename where the soft token shall be stored, for example \CM\server\certs\protocol-gateway-ra.p12
In Procedure, select Protocol Gateway RA Token.
Enter values in Country, Organization and set Common Name to Protocol Gateway RA.
In Signature PIN, enter the PIN for Security officer 1.
In the popup dialog, select a PIN for the soft token.
When the soft token is issued, a popup window is opened where the certificate is shown. Open, select Save to file (DER), and save protocol-gateway-ra.cer as a DER.encoded certificate.
Issue certificate for Protocol Gateway officer
The Protocol Gateway Officer that was imported, needs a certificate. In this example it is issued as a soft token.
In the menu, select Cross > Export Certificate > Binary.
Store the certificate as SystemCA.cer. This certificate shall be used later in the Protocol Gateway configuration.
Configure Protocol Gateway
Copy officer and RA tokens to Protocol Gateway
Copy the Protocol Gateway Officer token and the Protocol Gateway RA token to the Protocol Gateway \conf folder, for example C:\ProgramData\Nexus\cm-gateway\conf\certdir.
protocol-gateway-vro.p12 This is needed for Protocol Gateway as a virtual registration officer, when devices request certificates in an automated workflow.
protocol-gateway-ra.p12 This is needed for certain protocols (EST, CMP, CMC and SCEP), for example for Full PKI requests. The specified RA token is used to establish secure transactions with the end entities requesting certificates. For more information on Full PKI Requests, see the CMC specification: RFC 5272 Section 3.2.
Trust CM host
For Protocol Gateway to trust the CM host:
Copy the TLS CA certificate SystemCA.cer to the \conf\certdir trust store folder, for example C:\ProgramData\Nexus\cm-gateway\conf\certdir.
Set properties in CM-gateway.properties
To set properties for Protocol Gateway:
Open the file \Nexus\cm-gateway\conf\cm-gateway.properties for editing.
Modify the following properties:
Set cmhost to your CM host.
Set officer.keyfile to the Protocol Gateway Officer token file and officer.password to the related PIN.
Configure TLS Server Name Indication (SNI) parameter
Protocol Gateway supports configuration of the TLS Server Name Indication (SNI) parameter so that the correct server certificate can be obtained by the Protocol Gateway CM client during TLS handshake. This typically applies in cases where the IP hosting the CM server also hosts other services with different host names on the same TLS port, or if the CM server is located behind a proxy or a load balancer. For more information, see RFC 6066.
To use the server name indication feature in Protocol Gateway:
Open the file C:\ProgramData\Nexus\cm-gateway\conf\cm-gateway.properties for editing.
Set ssl.servernameindication to your CM hostname.
Start service
Start Protocol Gateway Tomcat service
Start the Protocol Gateway by starting the Tomcat service.