Set Up PKI Services ManagerReflection PKI Services Manager is a service that provides certificate validation services. If your client users will authenticate using X.509 certificates, you need to install and configure this service. It is available at no additional charge from the Reflection for Secure IT Web Edition download page. Reflection for Secure IT Web Edition requires version 1.2 SP2 or later. If you installed PKI Services Manager on Windows, you can configure required settings using the PKI Services Manager Console (Start > All Programs > Attachmate Reflection > Utilities). Or, on both Windows and UNIX, you can configure these settings by editing the PKI Services Manager configuration files (pki_config and pki_mapfile). For detailed configuration information, see the PKI Services Manager User Guide, which is available from http://support.attachmate.com/manuals/pki.html. PKI Services Manager Configuration
Sample Mapping Rules for Transfer Client AuthenticationWhen users log in to the Transfer Client using certificates, they present the certificate (for example using a CAC card) without entering a user name. The mapping system you devise must use the presented certificate to identify a user who can log in to the Transfer Client. The mapping rule must return exactly one user ID. If multiple user ID values are returned, the login will fail. Note: From the console, you can test mapping rules using Utility > Test Certificate. On UNIX, you can use the pki-client command line utility. The following examples use a single map rule to return the name of an allowed user based on the contents of the certificate that user presents:
It is also possible to configure multiple map rules. PKI Services Manager processes each rule in order until it finds a condition that matches the validated certificate. For example: RuleType user { acme\dgreen } Subject.Email Equals donald.green@acme.com { acme\jblue} Subject.Email Equals joseph.blue@acme.com Rules that return multiple names for the same certificate are not supported for authentication to the Web Edition Transfer Client. The following example returns two valid user names for the same certificate. In this case, a logon attempt using the certificate will always fail. { root dgreen } Subject.Email Equals donald.green@acme.com Note: Rules that configure multiple allowed identities for a single certificate are valid for SSH connections. For example, you can use a rule like the one above if you are configuring PKI Services Manager to validate certificates for users logging directly into the Reflection for Secure IT Server. In this case the user has already provided a username and the mapping rule establishes a set of one or more permitted names. Authentication is successful if the presented username is included within that set. In the case of an SSL connection (such as the connection to the Transfer Client), the user presents a certificate without a username and the mapping rules must return the username for exactly one user who can authenticate with this certificate. | ||||||
|