This is a guide on how to work with roles and access rules. To understand the general concepts, see the Roles and Access Rules Overview page.
Managing Role Namespaces
See main page: Managing Role Namespaces
Creating a New Administrator
Follow the steps below to create a new Administrator certificate, add this Administrator to a role, and testing the access.
Creating a Certificate Profile for the Administrator
Follow the steps below to create a new Certificate Profile for administrators. The administrators certificates will be issued by a CA called ManagementCA.
Under CA Functions > Certificate Profiles.
Click Clone for the profile named ENDUSER.
Enter AdministratorEndEntityCertificateProfile as the new name and click Create from Template.
Click Edit for the new profile.
Under Validity, enter 365d (1 year validity).
Under Key usage, choose Digital Signature and Key encipherment (Ctrl+Click to select multiple).
Clear Allow Key Usage Override.
Select Use Extended Key Usage.
Under Extended Key Usage, choose Client Authentication.
Under Available bit lengths, "1024 bit", "2048 bit" and "4096 bit".
Under Available CAs, choose ManagementCA (the CA you use to issue Administrator certificates).
Creating an End Entity Profile for the Administrator
Follow the steps below to create a new End Entity Profile for Administrators. The profile will be connected to the Certificate Profile created above.
Under RA Functions > Edit End Entity Profiles.
Enter a name for your end entity profile, AdministratorEndEntityProfile.
Select AdministratorEndEntityProfile and clickEdit End Entity Profile.
Under the Subject DN Fields, add DN fields for the Admin DN, for example O, UID and C.
Under Default Certificate Profile, choose AdministratorEndEntityCertificateProfile.
Under Available Certificate Profiles, choose AdministratorEndEntityCertificateProfile.
Under Default CA, choose ManagementCA.
Under Available CAs, choose ManagementCA.
Issue the following new end entity based on the new end entity profile: CN: SoftCard RA Admin1.
Creating a new RA Role
Follow the steps below to create a RA Admininistrator role with access to add/list/edit end entities:
Choose Administrator Roles in the left frame.
Choose a name for your new administrator group, RAAdministratorRole.
When the group is created, clickAccess Rules.
Choose the RA Administrator role template.
Under Authorized CAs, choose which CAs the role should have access to. Choose ManagementCA.
Under Edit End Entity Profiles, select AdministratorEndEntityProfile.
Adding new Administrators to the RA Role
Choose Search/Edit End Entities and select your newly created end entity, choose View Certificates.
Copy the value of Certificate Serial Number, e.g. 5F003A0113F507F9.
Go to Administrator Roles, clickAdministrators under RAAdministratorRole.
Choose the CA that the administrator belongs to, ManagementCA.
Paste the text from < in the Match value.
In EJBCA Enterprise Edition, it is also possible to add a new administrator to an existing role by using the WS API call addSubjectToRole in your application or with the Web Services CLI.
Test the new Administrator
Log in with the new administrators to view differences between that and the super administrator. Additionally, try the different roles and privileges to see the differences between them all.
The authorization privileges are cached and there will be a slight delay before a rule change is used.
Renewing the Super Administrator
Renewing the superadmin certificate is done in the same way as for any client certificate and you can use either the Admin GUI or the CLI.
The superadmin certificate is normally issued as a PKCS#12 keystore, if not issued as a browser certificate for smart card enrollment.
Renewing Superadmin Using the Admin GUI
To renew superadmin using the Admin GUI, do the following:
Go to Search/Edit End Entities and search for user superadmin.
Click Edit End Entity.
Set a new password and set status to NEW, click Save.
Go to Public Web and then Create Keystore.
Enter superadmin username, and the password you gave.
In the next screen, select key length 2048 and click OK.
Your new superadmin keystore is downloaded and you can install it in your browser.
Renewing Superadmin Using the CLI
To renew superadmin using the CLI, run the following:
bin/ejbca.sh ra setendentitystatus superadmin
bin/ejbca.sh ra setclearpwd superadmin password
Your new superadmin keystore is generated and stored in sudirectory p12. The password is password, as given to the setclearpwd command.
Using Client Certificates Issued by External CAs
Administrator certificates in EJBCA can be issued by a CA other than a CA in the same installation. This can for example be useful if you want to use a national ID for administration of an organizational PKI.
To use a certificate issued by an external CA as Administrator, do the following:
Add the CA-certificate to p12/truststore.jks with
-trustcacerts -file externalca.pem -keystore p12/truststore.jks -storepass changeit -alias externalca
Redeploy EJBCA truststore using ant deploy-keystore and restart the application server to make sure the new truststore is in use
Import the CA-certificate under CA UI > Certificate Authorities > Import CA Certificate or use the CLI.
Add the Administrator to the desired role under CA UI > Administrator Roles.
To allow administrators to log in when their certificates are not present in the EJBCA database, set web.reqcertindb=false in conf/web.properties.
Installing EJBCA with External Administrators
You can install an EJBCA instance from scratch, with a certificate from an external CA as the initial SuperAdmin certificate.
Start with deploying EJBCA as usual with ant deploy, but instead of running ant install, run the following to import the certificate of the external Administration CA and initialize the authorization system of EJBCA:
bin/ejbca.sh ca importcacert ManagementCA ManagementCA.cacert.pem -initauthorization -superadmincn SuperAdmin
You need to configure TLS and the truststore of the application server yourself, or if you have a p12/tomcat.jks and p12/truststore.jks this can be done for you on JBoss by ant deploy-keystore in the same way as configuring TLS as described in Installation Instructions.
The initial administrator that is set up has DN CN=SuperAdmin, but you can change this using the -superadmincn (run bin/ejbca.sh ca importcacert for documentation). You can also run the bin/ejbca.sh admins command for information on how to configure other admins.
After this command is run and TLS is correctly configured, you can log in to EJBCA and create your CAs in the CA UI. No initial CA is created for you.