In this section, an operator can set policy for the following areas in the ADSS Web RA:


CSR Verification

PIN Password Policy

PUK Password Policy

Request Settings


Certificate Signing Request (CSR) verification settings allows you to verify the key ownership, signature algorithm, strength of key exponents & modulus, Debian weak key, key lengths and key reuse while creating a CSR certificate on web portal.


  1. To setup CSR validation policies, click on Enable CSR Validation, this will display some more options to configure as validation policy including Key Ownership, Signature Algorithm, Public Key Exponent & Modulus, Debian Weak Key, Public Key Reuse and Key Length.
  2. On selection of one of the above configurations, that particular validation policy will be verified at the time of CSR generation. If one of the policies are not fulfilled then the certificate generation request cannot be completed.


These validation policies once applied, will be applicable across the application, and will validate these upon creation of CSR.


Expand Configurations > Policies > Requests from the left menu pane.


Enable CSR (Create Signing Request) Validation


To configure CSR validation policies, first of all you need to select the 'Enable CSR Validation' checkbox. You can tick the following checkboxes to configure settings for CSR generation: 


Enable CSR Validation 

Validation

Description 

Verify the Key Ownership 

Verify if the private key is in possession of the user who requested for a certificate at the time of CSR generation.

Verify the Public Key contains Valid Public Exponent and Modulus

Validate if the key length is among the allowed list of key lengths against the algorithm used in the CSR

Verify the Public Key is not already used 

Verify if the public key is not already used in previously submitted requests, issued, created or revoked certificates

Verify the Key Length 

Validate if the key length is among the allowed list of key lengths against the algorithm used in the CSR

Verify the Signature Algorithm

Verify the signature algorithms must be either RSA or ECDSA.

Verify that Debian weak keys are not used

Validate if the CSR keys are not generated using Debian Weak keys. Debian weak keys are generated because of a bug introduced in openSSL package in 2006. The bug was founded in 2008. All keys generated within that period are vulnerable and should not be used.




1) CSR Validation policies only validate when Enable CSR Validation is set.

2) When one of the above CSR validation policies is configured in ADSS Web RA admin, it validates these policies while approving a certificate request from ADSS Web RA user portal. If one of the CSR validation policies does not meet the criteria at the time of certificate request approval, enterprise RAO can decline the request by adding a reason to decline.

3) If one of the validation policies does not meet, it appears on decline reason dialog as a declining reason. Furthermore, RAO cannot proceed further.

4) If no validation policies failed, RAO can still decline a certificate request but there is no validation policy appears as a declining reason on decline dialog. A custom reason can be added though.

5) CSR-based validation only applies on those certificate requests where either a CSR is imported by the user, or a certificate request created using a PKCS#10, USB/Smart Card Tokens, request for  Go> Sign using MSCAPI.



PIN Password Policy


Expand Configurations > Policies > Requests from the left menu pane.


This is a default policy that will determine the default values for PIN and govern the process for users or operators when resetting these credentials. 


When enabled by the operator, it applies at the enterprise level. The selected settings and options are automatically reflected at the Enterprise level in the ‘Policies’ section.


When the operator enables the ‘Enable PIN Password Policy’ checkbox, the following fields will appear.


Fields

Description 

Minimum Password Length 

Defines the minimum number of characters required for a valid password.

Include 1 or more lowercase characters

If enabled, the password must contain at least one lowercase character.

Include 1 or more uppercase characters

If enabled, the password must contain at least one uppercase character.

Include 1 or more special characters 

If enabled, the password must contain at least one special character.




PUK Password Policy


Expand Configurations > Policies > Requests from the left menu pane.


This is a default policy that will determine the default values for PUK and govern the process for users or operators when resetting these credentials. 


When enabled by the operator, it applies at the enterprise level. The selected settings and options are automatically reflected at the Enterprise level in the ‘Policies’ section.


When the operator enables the ‘Enable PUK Password Policy’ checkbox, the following fields will appear.


Fields

Description 

Minimum Password Length 

Defines the minimum number of characters required for a valid password.

Include 1 or more lowercase characters

If enabled, the password must contain at least one lowercase character.

Include 1 or more uppercase characters

If enabled, the password must contain at least one uppercase character.

Include 1 or more special characters 

If enabled, the password must contain at least one special character.



Request Settings


Expand Configurations > Policies > Requests from the left menu pane.


This section allows operators to configure the permitted actions for certificate requests. 


Checkbox - Allow operators to create certificates on behalf of the user and facilitate automatic assignment


If this policy is enabled, the operators will have the option to generate certificates for users.


Note: If the certificate is being created for a user who does not exist in the system, a new account will be created for the user along with the certificate. 


If the user already has a registered account in the WebRA system, only the certificate will be created. The user will be notified via email about the certificate generation.


Meanwhile, if the user exists in the system but is not part of the enterprise where the certificate is being created, the system will send an invitation for the user to join that enterprise and will generate the certificate as well.


Checkbox - Allow declined requests to be resubmitted


If this policy is enabled, users can resubmit a certificate request that has been declined. This allows them to modify the required details and submit the request again for approval.