Validating Certificates; Securing Custom Certificates - Novell IDENTITY MANAGER 3.6. - INTEGRATION Integration Manual

For novell audit
Table of Contents

Advertisement

Identity Manager Certificate and Key Paths and Filenames
Table 6-2
Platform
Certificate Path and Filename
Windows
\windows_directory\dxicert.pem \windows_directory\dxipkey.pem
Linux and Solaris
/etc/dxicert.pem
NOTE: If you are using the pure Java remote loader (dirxml_jremote), the above locations
work. However, if dirxml_jremote is running on a non-UNIX-like platform, you must add the
following to the Java invocation line in the dirxml_jremote script:
-Dnovell.dirxml.remoteloader.audit_key_directory=<directory_name>

6.5 Validating Certificates

In Novell Audit, all logging application certificates must be signed by the Secure Logging Server
root certificate and they must contain an application identifier.
Use the following AudCGen command to determine whether a certificate is valid:
audcgen -cacert:filename -capkey:filename -verify -appcert:filename
When you use the -verify command, AudCGen checks the integrity of the target certificate. It
determines if the target certificate is derived from the Secure Logging Server root certificate
(trusted) and returns the logging application's application identifier.
The following sample command verifies the certificate for the Identity Manager Instrumentation:
audcgen -cacert:cacert.pem -capkey:capkey.pem -verify
-appcert:c:\windows\dxicert.pem
For more information, see
NOTE: Novell Audit 2.0.2 verifies only the Secure Logging Server and logging application
certificates. It does not verify any other certificates in the certificate chain. Consequently, if the
third-party CA expires or invalidates the Secure Logging Server certificate, AudCGen does not
identify the problem in the certificate chain and still trusts the Secure Logging Server root certificate
and its associated logging application certificates.

6.6 Securing Custom Certificates

If you generate a custom certificate and private key for the Identity Manager Instrumentation, it is
important to protect them because the location and name of the custom certificates are hardcoded.
The certificate and key files should only be accessible by the Identity Manager Instrumentation,
which loads locally on the server.
The following sections review the steps to protect custom certificates on each Novell Audit server
platform.
Section 6.6.1, "Windows," on page 38
Section 6.6.2, "Linux and Solaris," on page 38
Section 6.2, "The Novell Audit AudCGen Utility," on page
PrivateKey Path and Filename
/etc/dxipkey.pem
Securing the Connection with Novell Audit
32.
37

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the IDENTITY MANAGER 3.6. - INTEGRATION and is the answer not in the manual?

Questions and answers

Table of Contents