i 
Table of Contents 
1 PKI Configuration······································································································································1-1 
Introduction to PKI···································································································································1-1 
PKI Overview···································································································································1-1 
PKI Terms········································································································································1-1 
Architecture of PKI···························································································································1-2 
Applications of PKI ··························································································································1-3 
Operation of PKI······························································································································1-3 
PKI Configuration Task List ····················································································································1-4 
Configuring an Entity DN ························································································································1-4 
Configuring a PKI Domain ······················································································································1-6 
Submitting a PKI Certificate Request······································································································1-7 
Submitting a Certificate Request in Auto Mode ··············································································1-7 
Submitting a Certificate Request in Manual Mode··········································································1-8 
Retrieving a Certificate Manually············································································································1-9 
Configuring PKI Certificate Verification·································································································1-10 
Destroying a Local RSA Key Pair ·········································································································1-11 
Deleting a Certificate·····························································································································1-11 
Configuring an Access Control Policy···································································································1-12 
Displaying and Maintaining PKI ············································································································1-12 
PKI Configuration Examples·················································································································1-13 
Requesting a Certificate from a CA Running RSA Keon ······························································1-13 
Requesting a Certificate from a CA Running Windows 2003 Server············································1-16 
Troubleshooting PKI······························································································································1-19 
Failed to Retrieve a CA Certificate································································································1-19 
Failed to Request a Local Certificate ····························································································1-20 
Failed to Retrieve CRLs ················································································································1-20