Install Novell Certificate Server |
For the first installation to an eDirectory® tree:
For subsequent installations:
-
Supervisor to the W0 object
-
Rights needed to create a Server Certificate object
If a user doesn't have the rights to create a Server Certificate object, the installation finishes, but the Server Certificate objects wil need to be created manually by someone with the appropriate rights and applications that use these certificates will need to be manually configured.
|
Creating an Organizational CA |
|
Viewing the Organizational CA's properties and certificates |
|
Exporting the Organizational CA's certificate(s) |
|
Issuing a public key certificate |
-
Read to the
NDSPKI:Private Key on the Organizational CA's object
Exception: If the object trying to issue the public key certificate is an NCP server, then the rights needed are:
-
Write to the
NDSPKI:Private Key on the Organizational CA’s object
|
Backing up and restoring an Organizational CA |
|
Moving the Organizational CA to a different server |
|
Validating the Organizational CA's Certificates |
|
Replacing the Organizational CA |
|
Deleting the Organizational CA |
|
Creating Server Certificate objects |
-
Read to the attribute
NDSPKI:Private Key on the Organizational CA's object (only if using the Org. CA)
Exception: If the object trying to issue the public key certificate is an NCP server then the rights needed are:
-
Supervisor on the server’s container
-
Write to the
NDSPKI:Private Key on the Organizational CA’s object
|
Importing a public key certificate into a Server Certificate object |
|
Deleting a Server Certificate object |
|
Exporting a Trusted Root or Public Key Certificate from a Server Certificate object |
|
Viewing the Server Certificate object's properties and certificates |
|
Backing up and restoring a Server Certificate object |
|
Validating Server Certificates |
|
Revoking Server Certificates |
|
Replacing a server certificate's keying material |
|
Creating user certificates |
-
Read to the attribute
NDSPKI:Private Key on the Organizational CA object
-
Read and Write to the attribute
NDSPKI:userCertificateInfo on the User object
-
Read and Write to the attribute
SAS:SecretStore on the User object
-
Read and Write to the attribute
userCertificate on the User object
Exception: If the object trying to issue the public key certificate is an NCP server then the rights needed are:
-
Write to the
NDSPKI:Private Key on the Organizational CA’s object
-
Read and Write to the attribute
NDSPKI:userCertificateInfo on the User object
-
Read and Write to the attribute
SAS:SecretStore on the User object
-
Read and Write to the attribute
userCertificate on the User object
|
Importing a public key certificate into a User object |
|
Viewing a user certificate's properties |
|
Exporting a user certificate |
|
Exporting a user's private key and certificate |
|
Deleting a user certificate and private key |
|
Validating User Certificates |
|
Revoking User Certificates |
|
Creating a Trusted Root Container |
|
Creating a Trusted Root object |
|
Viewing a Trusted Root object's properties |
|
Replacing a trusted root certificate |
-
Read and Write to
NDSPKI:Not Before on the Trusted Root object
-
Read and Write to
NDSPKI:Subject Name on the Trusted Root object
-
Read and Write to
NDSPKI:Trusted Root Certificate on the Trusted Root object
|
Validating a trusted root certificate |
|
Revoking a trusted root certificate |
|
Deleting a Trusted Root object |
|
Creating a CRL Container |
|
Deleting a CRL Container |
|
Creating a CRL Configuration object |
|
Activating a CRL Configuration object |
|
Viewing and/or Modifying a CRL Configuration object's Properties |
Modifying
Viewing
|
Deleting a CRL Configuration object |
|
Creating a CRL object |
|
Exporting a CRL file |
|
Replacing a CRL file |
|
Viewing a CRL object's properties |
|
Deleting a CRL object |
|
Creating a Security container |
|
Creating a SAS service object |
|