Home > Manage CAs > Manual Certification > X.509 Certificates

X.509 Certificates

The ADSS Manage CA(s) module supports the manual import and certification of RFC 2986 based PKCS#10 certificate signing requests (CSRs). The corresponding certificate is then issued against the imported PKCS#10 by one of the the configured Local CAs and External CAs.

To import a PKCS#10 and generate a certificate, click on the Manual Certification button and the following page will appear.



Name Constraints extension will be displayed if:



If PKCS#10 has name constraint extension, these name constraints will be displayed on the screen. The operator can manually change the values in the fields as well. Only those fields will be displayed that are enabled in certificate template. 
 
Each element of the form is described below:

 

Item Description
Certificate Alias
Certificate Alias is the name of the certificate by which a certificate is recognized uniquely in ADSS Server.


The special characters  
&, <, > can not be used in Certificate Alias.
Import PKCS#10
This is the path to the PKCS#10 on the file system.
Use Local CA
Select an internal CA that is configured to service the certification requests from the ADSS Certification Service. The ADSS Certification Service will send PKCS#10 certificate request messages to this internal CA.
Certificate Template
A certificate template defines the characteristics of the keys and certificates.
CA Certificate
This drop down shows the list of configured Local CA(s). Select one CA against which you want to issue the certificate.
External CA
Select this radio button to use an external online CA that is configured to service the certification requests from the ADSS Certification Service. The ADSS Certification Service will send PKCS#10 certificate request messages to this external CA. Currently the ADSS CA Server, Microsoft CA, GlobalSign EPKI and EJBCA are supported.
Name Constraints Name Constraints section will only be visible if name constraints extension is enabled in the relevant certificate template having purpose 'Certificate/CRL Signing'. Name Constraints section will not be visible while generating self-signed certificates. This section contains following options:

Permitted Names: 

1. rfc822Name
If email is configured as 'alpha.com' then permitted name in certificate would be 'admin@alpha.com'. Or if email is configured as '.alpha.com' then permitted name in certificate would be 'admin@sub.alpha.com'. Multiple rfc822Name can be added by clicking on '+' button.

2. dNSName
If dNSName is configured as 'alpha.com' then permitted name in certificate would be 'www.alpha.com'. Or if dNSName is configured as '.alpha.com' then permitted name in certificate would be 'www.sub.alpha.com'. Multiple dNSName can be added by clicking on '+' button.

3. iPAddress
If IP Address is configured as 192.168.2.0 then permitted IP Address would be 192.168.2.5 as it falls in allowed sub-net however IP Address of other sub-net would not be allowed. Multiple iPAddress can be added by clicking on '+' button. Note only IPv4 addresses are supported.

4. Directory Name
If [OU=excludedSutree1,O=TestCertificates 2011,C= US] is configured then permitted name in certificate would be  [CN=John,OU=excludedSutree1,O=TestCertificates 2011,C=US] along with the same orderMultiple Directory Names can be added by clicking on '+' button. 


Excluded Names:

1. rfc822Name
If email is configured as 'alpha.com' then 'admin@alpha.com' would not be allowed. Or if email is configured as '.alpha.com' then 'admin@sub.alpha.com' would not be allowed. Multiple rfc822Name can be added by clicking on '+' button.

2. dNSName
If dNSName is configured as 'alpha.com' then 'www.alpha.com' would not be allowed. Or if dNSName is configured as '.alpha.com' then 'www.sub.alpha.com' would not be allowed. Multiple dNSName can be added by clicking on '+' button.

3. iPAddress
If IP Address is configured as 192.168.2.0 then all IP Address that falls in same sub-net would not be allowed. Multiple iPaddress can be added by clicking on '+' button.

4. Directory Name
If [OU=excludedSutree1, O=TestCertificates 2011, C=US] is configured then following would not be allowed [CN=John, OU=excludedSutree1, O=TestCertificates 2011, C=US]. Multiple Directory Name can be added by clicking on '+' button.

By clicking the OK button, the respective certificate (with or without name constraint extension) will be generated and you will be moved to the following page.



The generated certificate can be:

 

See also