Installing and Configuring CLM 2007 on a Server
Microsoft® Identity Lifecycle Manager "2" Certificate Management Service (ILM CMS) is an identity-assurance management system that maximizes the trust and flexibility associated with digital certificates and smart cards. A server that runs this software is known as a CLM server.
The following topics describe how to install and configure ILM CMS on a server:
Requirements for Installing CLM 2007
Before You Install CLM 2007
Installing SQL Server 2005
Installing CLM 2007 on a Server
Configuring CLM 2007 Using the CLM Configuration Wizard
Configuring the CA for CLM 2007
Configuring Active Directory Users and Groups
Configuring CLM 2007 Access Control
Requirements for Installing CLM 2007
To install ILM CMS, you must meet specific hardware and software requirements. Table 1 shows the hardware requirements for a CLM server.
Table 1 Hardware requirements for a CLM server
Hardware | Requirement |
---|---|
Processor |
A 1.8 GHz Intel Pentium 4 processor. We recommend that you use an Intel Pentium 4 or AMD Opteron processor. |
RAM |
1,024 megabytes (MB) of RAM. We recommend that you install 2 gigabytes (GB) or more of RAM. |
Hard disk |
A 40 GB or larger hard disk. Disk space requirements vary based on use and log file management. |
DVD drive |
A DVD drive is required to install Microsoft SQL Server™ database software from a DVD-ROM. |
Display |
A Super VGA (SVGA) display with a resolution of 800 x 600 or higher and 256 colors. |
Mouse |
A mouse or other input device. |
Network |
A LAN connection with at least a 56K modem. A network connection is required for distributed management. |
Table 2 shows the software requirements for ILM CMS.
Table 2 Software requirements for CLM 2007
Software | Description |
---|---|
Active Directory® directory service |
An Active Directory infrastructure with a domain controller running on Microsoft Windows® 2000 or Windows Server® 2003. |
Certification authority (CA) |
At least one Microsoft® Windows Server® 2003, Enterprise Edition CA. |
Microsoft Certificate Lifecycle Manager 2007 |
At least one instance of the software installed on a server that is running Microsoft® Windows Server® 2003, Enterprise Edition or Microsoft® Windows Server® 2003, Datacenter Edition. |
Microsoft SQL Server |
ILM CMS supports Microsoft SQL Server 2005, Standard Edition, Service Pack 1 and Microsoft SQL Server 2005, Enterprise Edition, Service Pack 1. ILM CMS also supports Microsoft SQL Server 2000 Service Pack 4. |
Internet Information Services (IIS) 6.x |
ILM CMS uses IIS as its Web server to run the CLM Web site. |
The Microsoft .NET Framework 2.0 |
ILM CMS is a Microsoft .NET-connected application. You must install the Microsoft .NET Framework 2.0 on the server. |
Microsoft Internet Explorer® 6.x |
Because ILM CMS requires Secure Sockets Layer (SSL) and Transport Layer Security (TLS) for administrative traffic and certificates, Internet Explorer 6.x is required. In addition, ILM CMS has advanced scripting features that are optimized for Internet Explorer. |
Note
You can use one CLM server to manage multiple CAs, or multiple CLM servers to manage one CA.
The CLM server acts as administrative proxy to the CAs and provides a Web-based user interface (CLM Web site) for ILM CMS.
ILM CMS is integrated with Active Directory and Active Directory Certificate Services. ILM CMS stores profile template configuration information in Active Directory.
ILM CMS stores workflow and audit information in a SQL Server database accessed by the CLM server and the CA modules in ILM CMS. This database is known as the CLM database.
Important
To deploy smart cards or enable online certificate updates, ILM CMS requires the Microsoft Certificate Lifecycle Manager 2007 Client software, which it accesses through Internet Explorer. However, ILM CMS does not require client-side software for you to manage software-based certificates.
Before You Install CLM 2007
Before you install ILM CMS, you must complete the following prerequisite tasks:
Step 1: Modify the Active Directory schema
Step 2: Enable the default KeyRecoveryAgent certificate template
Step 3: Enable the default EnrollmentAgent certificate template
Step 1: Modify the Active Directory schema
To modify the Active Directory schema, you must be a member of the Schema Admins group for the Active Directory forest.
Before you install ILM CMS, you must apply the schema modifications that are defined in Clm.ldif, which is a Lightweight Directory Access Protocol (LDAP) Data Interchange Format (LDIF) file. You can use either of the following methods to apply the modifications:
Run the LDAP Data Interchange Format Data Exchange tool, ldifde.exe.
ldifde.exe is part of Windows Support Tools, which assist support personnel and network administrators in managing their networks and troubleshooting problems. They are not installed with the Windows operating system; you must install them separately from the Windows XP or Windows Server 2003 installation CD. To install the tools, you run Suptools.msi, which you can find on the Windows installation CD at the following location: Support\Tools.
Run the ModifySchema.vbs sample script.
ModifySchema.vbs modifies the schema on the default forest using the current credentials for the user. If your settings differ from the default settings, you must edit the script before you run it.
Clm.ldif and ModifySchema.vbs are on the ILM CMS installation CD at the following location: CLM\Schema.
Step 2: Enable the default KeyRecoveryAgent certificate template
A key recovery agent is a role performed by an information technology (IT) administrator who can decrypt archived private keys for users. KeyRecoveryAgent is the default certificate template for the key recovery agent in ILM CMS. The certificate template is only available if it is enabled on an active enterprise CA in the CA hierarchy.
Note
A user who is assigned the Manage CA permission to the enterprise CA must perform the following procedure.
To enable the default KeyRecoveryAgent certificate template
Click Start, point to Administrative Tools, and then click Certification Authority.
In Certification Authority, expand the set of folders for the default CA.
In the console tree, right-click Certificate Templates, point to New, and then click Certificate Template to Issue.
In New Certificate Template to Issue, select Key Recovery Agent, and then click OK.
Step 3: Enable the default EnrollmentAgent certificate template
An enrollment agent is an IT administrator who requests certificates on behalf of a user. EnrollmentAgent is the default certificate template for the enrollment agent in ILM CMS. The certificate template is only available if you enable it on an active enterprise CA in the CA hierarchy.
Note
A user who is assigned the Manage CA permission to the enterprise CA must perform the following procedure.
To enable the default EnrollmentAgent certificate template
Click Start, point to Administrative Tools, and then click Certification Authority.
In Certification Authority, expand the set of folders for the default CA.
In the console tree, click Certificate Templates.
Right-click Certificate Templates, and then click New Certificate Template to Issue.
In New Certificate Template to Issue, click Enrollment Agent, and then click OK.
Installing SQL Server 2005
To get help, you can click Help on many pages of the SQL Server Installation Wizard.
To install SQL Server 2005
Insert the SQL Server 2005 DVD into your DVD drive, and then click Run the SQL Server Installation Wizard.
If the installation process does not start automatically, run Splash.hta from the root directory of the DVD. To install SQL Server 2005 from a network, run Splash.hta from that network.
On the End User License Agreement page, read the license terms, select I accept the terms in the license agreement, and then click Next. To stop the installation, click Cancel.
On the SQL Server Component Update page, click Install, and thenclick Finish.
On the Welcome page, click Next to scan the installation computer for conditions that could block installation.
On the System Configuration Check page, perform any of the following actions, and then click Continue:
To interrupt the scan, click Stop.
To view scan results by category, click Filter, and then select an option from the Filter list.
To view scan results for system configuration, click Report, and then select an option from the Report list.
You can view the report, save it to a file, copy it to the Clipboard, or attach it to an e-mail message.
On the Registration Information page, in Name and Company, type your name and company respectively, and then, click Next.
On the Components to Install page, select the component groups that you want to install.
When you select a component group, you see a description for it in Components to be Installed. You can select any combination of check boxes. When you select SQL Server or Analysis Services, if Setup detects that you are installing to a virtual server, it enables the Install as a Virtual Server check box. You must select this option to install a failover cluster.
Note
For information about installing a failover cluster, see How to: Create a New SQL Server 2005 Failover Cluster (Setup) (https://go.microsoft.com/fwlink/?LinkId=76490).
To install individual components, click Advanced to open the Feature Selection page, or click Next.
If you opened the Feature Selection page, select the components that you want to install, and then click Next.
To install components to a custom directory, you can select the component, and then click Browse to locate a directory.
On the Instance Name page, select a default or named instance for your installation. You have the following options:
To use an existing default or named SQL installation instance, select it.
SQL Server 2005 Setup upgrades the instance, and then offers to install additional components. You cannot have an exiting default instance if you want to install a new default instance.
To install a new named instance, click Named Instance, and then type a unique instance name.
To install a new named instance side-by-side with an existing instance, click Named Instance, and then type a unique instance name.
For more information about instance naming rules, click Help.
On the Service Account page, specify the user name, password, and domain name for the SQL Server service accounts.
You can use one account for all the services or you can perform one of the following actions to specify an individual account for each service:
To specify an individual account, click Customize for each service account, select a service name, provide logon credentials for the service, and then click Next.
To use one account for all services, provide logon credentials for the service, and then click Next.
Note
The domain name cannot be a full Domain Name System (DNS) name. For example, if your DNS name is contoso.com, use contoso in the Domain field. SQL Server does not accept contoso.com in the Domain field.
On the Authentication Mode page, select one of the following authentication modes to use for your SQL Server installation:
Windows Authentication
This mode creates a system administrator account, which is disabled by default. Whenever possible, use Windows Authentication and a strong password. Do not use a blank password. For information about strong passwords, see Authentication Mode (https://go.microsoft.com/fwlink/?LinkId=80692).
Mixed Mode Authentication
This mode creates a system administrator account. For information about using mixed-mode authentication and enabling the system administrator account after SQL Server 2005 Setup completes, see How to: Change Server Authentication Mode (https://go.microsoft.com/fwlink/?LinkId=83784).
If you selected mixed-mode authentication, type and confirm the system administrator (sa) log on information, and then click Next.
Note
For SQL Server 2005, the installation may not enforce the strong password requirement on some default configurations of Windows Server 2003 where the computer is not a member of a domain.
To specify the collation for your SQL Server installation, on the Collation Settings page, enter your collation settings, and then click Next.
If you chose to install Reporting Services, on the Report Server Installation Options page, accept the default selections to configure the report server. If the requirements for installing Reporting Services in the default configuration are not satisfied, you must select the Install but do not configure the server option. To view installation details for this page, click Details, and then click Next.
On the Error and Usage Report Settings page, select whether to automatically send error reports for SQL Server 2005 and whether to automatically send feature usage data for SQL Server 2005 to Microsoft, and then click Next.
On the Ready to Install page, review the summary of components for your SQL Server installation, and then click Install.
To monitor installation, on the Setup Progress page, view the installation information, or click the component or status name to view the installation log.
To view the summary log, on the Completing the Microsoft SQL Server Installation Wizard page, click the link provided.
To exit Microsoft SQL Server 2005 Setup, click Finish.
If you are instructed to restart the computer, do so now.
Failure to restart the computer may cause failures when you run Setup in the future. For more information, read the installation message.
Download and install any SQL Server 2005 or SQL Server 2000 service packs that are available.
Installing CLM 2007 on a Server
You can install ILM CMS and the CA on the same server or on separate servers.
Install CLM 2007 and the CA on the same server
Before you install ILM CMS and the CA on the same server, evaluate the hardware specifications for the server to ensure that it has a capable CPU and enough available hard drive space to accommodate both ILM CMS and the CA. We recommend that you evaluate this deployment scenario on a test server before you implement it on your network.
To install CLM 2007 and the CA on the same server
From the ILM CMS installation CD, run CLM.msi.
CLM.msi is located at Drive\CLM\. Drive is the name of your CD or DVD drive.
On the Welcome to the Installation Wizard page, click Next.
On the Certificate Lifecycle Manager License Agreement page, read the license terms, select I accept the terms in the license agreement, and then click Next.
On the Custom Setup page, verify that all of the available components are selected.
To change where you install the files, click Change, choose a different location, and then click OK.
The default location is %ProgramFiles%\Microsoft Certificate Lifecycle Manager.
On the Custom Setup page, click Next.
On the Virtual Web Folder page, specify a name for a virtual Web folder.
This folder will be the address for the CLM Web site. The default virtual Web folder name is Clm.
On the Ready to Install Certificate Lifecycle Manager page, click Install.
On the Certificate Lifecycle Manager Installation Complete page, clear the Launch the CLM Configuration Wizard check box, and then click Finish.
Install the CLM 2007 Web site on a server separate from the CA
You can install the ILM CMS Web site on a different server than where the CA is installed. You might do this to physically separate the ILM CMS and CA roles.
By default, the CLM Installation Wizard installs the server component, the Web site, and the CA policy and exit modules on the same server. To install the CLM Web site on a server separate from the CA, you must choose a custom setup in the CLM Installation Wizard to install the policy and exit modules on the CA server with the CLM server component.
To install the CA policy and exit modules on the server where you installed the CA
Log on to the computer where you want to install the CLM server components and the policy and exit modules.
From the ILM CMS installation CD, run CLM.msi.
CLM.msi is located at Drive\CLM\. Drive is the name of your CD or DVD drive.
On the Welcome to the Installation Wizard page, click Next.
On the Certificate Lifecycle Manager License Agreement page, read the license terms, select I accept the terms in the license agreement, and then click Next.
On the Product Key page, type a valid product key, and then click Next.
If you do not enter a valid product key, the installation software installs ILM CMS as an evaluation copy, which you can use for 180 days.
On the Custom Setup page, select CLM CA Files and CLM System Files.
To change where you install the files, click Change, choose a different location, and then click OK.
The default installation path is %ProgramFiles%\Microsoft Certificate Lifecycle Manager.
On the Custom Setup page, in the list next to the Web Files, select This feature will not be available to prevent that Web Files from installing.
On the Custom Setup page, click Next.
On the Ready to Install Certificate Lifecycle Manager page, click Install.
On the Certificate Lifecycle Manager Installation Complete page, click Finish.
Note
For information about configuring the CLM exit module and CLM policy module for the CA, see Configuring the CA for CLM 2007.
Important
Before you start complete the next procedure, be sure that you installed the CA modules and that you have a SQL Server database available.
To install the Web site on the CLM 2007 computer
From the ILM CMS installation CD, run CLM.msi.
CLM.msi is located at CDDrive\CLM\. CDDrive is the name of your CD drive.
On the Welcome to the Installation Wizard page, click Next.
On the Certificate Lifecycle Manager License Agreement page, read the license terms, select I accept the terms in the license agreement, and then click Next.
On the Product Key page, type a valid product key, and then click Next.
If you do not enter a valid product key, the installation software installs ILM CMS as an evaluation copy, which you can use for 180 days.
On the Custom Setup page, in the list next to CLM CA Files, select This feature will not be available to prevent CLM CA Files from installing.
On the Custom Setup page, select Web Files and CLM System Files.
To change where you install the files, click Change, choose a different location, and then click OK.
The default installation path is %ProgramFiles%\Microsoft Certificate Lifecycle Manager.
On the Virtual Web Folder page, specify a name for a virtual Web folder.
This folder will be the address for the CLM Web site. The default virtual Web folder name is Clm.
On the Ready to Install the Certificate Lifecycle Manager page, click Install to begin installation.
On the Certificate Lifecycle Manager Installation Complete page, click Finish.
Configuring CLM 2007 Using the CLM Configuration Wizard
To configure the ILM CMS on the CLM server, you run the CLM Configuration Wizard. However, if you plan to run the CLM Configuration Wizard from a user account that is a child domain administrator, you must first assign specific user rights and permissions to the Domain Admins group.
Perform prerequisite configuration tasks
If you do not want to run the CLM Configuration Wizard as a member of the Enterprise Admins group, you must complete prerequisite configuration tasks.
Note
We recommend that you run CLM Configuration Wizard from a user account that is a member of the Enterprise Admins group. That group has the necessary permissions for the relevant profile templates and certificate templates. For information about configuring ILM CMS as a member of the Enterprise Admins group, see Run the CLM Configuration Wizard.
If you want to configure the CLM server as a child domain administrator, you must perform the following procedure to grant the necessary permissions to the Domain Admins group for the Certificate Templates container and the Profile Templates container.
To perform prerequisite tasks to configure the CLM server as a child domain administrator
Use the Certification Authority snap-in to grant the following permissions on the Certificate Templates container to the Domain Admins group of the child domain:
List Contents
Read All Properties
Write All Properties
Read Permissions
Modify Permissions
Modify Owner
All Validated Writes
Use the Certificate Templates snap-in to grant Read and Write permissions on the User, KeyRecoveryAgent, and EnrollmentAgent certificate templates to the Domain Adminsgroup of the child domain.
To use the Active Directory Sites and Services snap-in to create a container for profile templates, do the following steps:
- In Configuration, under Public Key Services, name the container Profile Templates, and then ensure that it is of the Container class.
In Active Directory Sites and Services, grant the following permissions on the Profile Templates container to the Domain Admins group of the child domain:
List Contents
Read All Properties
Write All Properties
Read Permissions
Modify Permissions
Modify Owner
All Validated Writes
Create All Child Objects
Grant the Restore files and directories user right to the to the Domain Admins group of the child domain on the root domain controller.
Optionally, create the CLM agent accounts, and then grant them Read and Enroll permissions to the User, KeyRecoveryAgent, and EnrollmentAgent certificate templates.
Active Directory might require additional permissions based on the service connection point location.
If the CLM server and the server on which you installed the CA are in different domains, the domain administrator running the CLM Configuration Wizard might require additional access to modify the CA settings.
Run the CLM Configuration Wizard
To correctly configure ILM CMS, you must run the CLM Configuration Wizard. The CLM Configuration Wizard guides you through the necessary configuration tasks and creates the CLM database. It can also create the required user accounts automatically.
Note
Although you can perform the following procedure without performing the prerequisite configuration tasks described in Perform prerequisite configuration tasks, you can do so only if you perform this procedure with a user account that is a member of the Enterprise Admins group.
To configure CLM 2007
Click Start, point to Programs, point to Microsoft Certificate Lifecycle Manager, and then click Configuration Wizard.
On the Welcome to the Configuration Wizard page, click Next.
On the CA Configuration page, verify the name of the CA and the Domain Name System (DNS) name for the CA server, and then click Next.
If you want to specify a remote CA, do the following steps:
Click Browse, and then select any enterprise CA in the forest shown in the Select Certification Authority dialog box.
Verify the CA and DNS names, and then click OK.
On the Set up the SQL Server Database page, configure SQL Server for use with ILM CMS. In Name of SQL Server, type the IP address of the SQL Server database. If the SQL Server database is on the same computer, use the default value, which is (local).
On the Set up the SQL Server Database page, configure SQL Server service account.
On the Set up the SQL Server Database page, configure the password for the SQL Server administrative account. To use the credentials for the current user, or to specify a user account and password to use to connect to the SQL Server database, perform one of the following actions:
To use the account information for the current user, select the Use my credentials to create the database check box.
To specify a different user account, clear the Use my credentials to create the database check box, and then type the user account and password used for connections to the SQL Server database.
If you installed the SQL Server database on a different server, or if you want to use the credentials for a different user, provide the user account information and password.
On the Set up the SQL Server Database page, click Next.
On the Database Settings page, under Database name, specify the name for the CLM database.
Under Specify a location for the database file, you can enter a location or use the null value. If you use the null value, ILM CMS uses the default location for the SQL Server database file.
Note
We recommend that you browse for a database directory only if you installed SQL Server on the same computer as you installed ILM CMS.
Under Specify the database user account that Certificate Lifecycle Manager uses to connect to the database, choose one of the following authentication methods:
SQL integrated authentication is selected by default, which specifies that you want to use Windows Integrated Authentication for SQL Server. This authentication mechanism gives the Web Pool Agent account the necessary permissions to the CLM database.
Click SQL mixed mode authentication if you want to provide a different user account and password for ILM CMS to connect to the SQL Server database. You can use the default name for the user account, which is CLMUser, or you can specify a name for a custom user account. If you use the SQL Mixed Mode Authenticationsetting, the CLM Configuration Wizard also creates a user account named CLMExternal, which is used for creating requests with the CLM SQL API.
On the Database Settings page, click Next.
On the Set up Active Directory page, type the name of the directory entry that Active Directory uses to store ILM CMS configuration information.
Use the default values on the Directory Settings page, and then click Next.
On the Agents - Microsoft CLM page, peform one of the following actions:
To use the default user accounts, leave the check boxes unchanged.
Table 3 shows the required ILM CMS agent user accounts and their default user names.
To create a custom user account, clear the Use the CLM default settings check box, and then click Custom Accounts.
On the Agents - Microsoft CLM page, click Next.
On the Set up server certificates page, perform one of the following actions:
To use the default certificate templates for the key recovery agent, the CLM agent, and the enrollment agent, leave the check boxes unchanged.
Table 4 shows these certificate templates.
To manually create and configure the certificate templates, select the Create and configure certificates manually check box.
On the Set up server certificates page, click Next.
On the Set up E-mail Server, Document Printing page, type the IP address or DNS name of the Simple Mail Transfer Protocol (SMTP) host that ILM CMS uses to send e-mail notifications.
The default SMTP IP address is 127.0.0.1, which indicates that ILM CMS uses the local SMTP service.
Note
To distribute one-time passwords, ILM CMS requires anonymous SMTP relaying. If you configure SMTP relaying on an SMTP server, you can lock SMTP relaying to a specific IP address. You can also configure SMTP relaying to perform authenticated relaying to an SMTP server where SMTP relaying can resolve a mail exchanger (MX) record. For more information about enabling local SMTP relaying, see Configuring SMTP Virtual Server Relay Restrictions (IIS 6.0) (https://go.microsoft.com/fwlink/?LinkId=81978).
Type the name of the folder where ILM CMS stores files to send to a printer.
The default folder for these files, Print Documents, is at the following location: %ProgramFiles%\Microsoft Certificate Lifecycle Manager\Print Documents.
On the Set up E-mail Server, Document Printing page, click Next.
On the Ready to Configure page, verify the selected settings, and then click Configure.
This might take a few minutes.
When the configuration completes, click Finish to exit the CLM Configuration Wizard.
To open the CLM Web site, in Internet Explorer, go to https://DNSName/CLM.
DNSName is the DNS name assigned to the server that hosts ILM CMS.
Note
On each computer where you want to use to access the CLM Web site, you must add the CLM Web site to the Trusted Sites Web content security zone in Internet Explorer. Because the CLM Web site enforces the use of trusted sites, it does not function correctly if you do not add the CLM Web site to Trusted Sites.
By default, Active Directory stores the CLM agent user accounts in the CN=Users,DomainName container. DomainName is the Lightweight Directory Access Protocol (LDAP) distinguished name of the default domain. Table 3 shows the required CLM agent user accounts and their default user names. The previous procedure describes how to create these accounts using the CLM Configuration Wizard. ILM CMS uses these agent user accounts to perform administrative operations.
Table 3 Required CLM agent user accounts
CLM agent user account | Description |
---|---|
CLM Agent |
Conducts operations for ILM CMS that require specific permissions. ILM CMS uses this agent to sign data. The default account name for this agent is CLMAgent. |
Key Recovery Agent |
Recovers archived private keys from the CA. The default account name for this agent is CLMKRAgent. |
Authorization Agent |
Reads security information of user and group entries in Active Directory. The default account name for this agent is CLMAuthAgent. |
CA Manager Agent |
Performs actions against the certification authority. The default account name for this agent is CLMCAMngr. |
Web Pool Agent |
Runs ILM CMS in IIS. The default account name for this agent is CLMWebPool. If you use Integrated Windows Authentication, it grants the Web Pool Agent permissions to the CLM database and performs all read/write operations that the CLM server would otherwise perform in the SQL Server database. |
Enrollment Agent |
Requests certificates on behalf of a user account. The default account name for this agent is CLMEnrollAgent. |
Table 4 shows the required certificates and certificate templates for the Key Recovery Agent, the CLM Agent, and the CLM Enrollment Agent.
Table 4 CLM agent user account certificates
Certificate | Certificate template |
---|---|
Key Recovery Agent |
Requests the key recovery agent certificate that is used by the CLMKRAgent user account. By default, ILM CMS uses the KeyRecoveryAgent certificate template. |
CLM Agent signing |
Signs certificate requests. By default, ILM CMS uses the User certificate template. |
Enrollment agent |
Signs certificate requests by the CLMEnrollAgent user account. By default, ILM CMS uses the EnrollmentAgent certificate template. |
Configuring the CA for CLM 2007
For ILM CMS to work correctly, you must configure the CLM exit module and CLM policy module.
Configure the CLM exit module
To configure the CLM exit module, you must have the Manage CA permission for the local CA.
To configure the CLM exit module
Click Start, point to Administrative Tools, and then click Certification Authority.
In the Certification Authority snap-in, right-click CAName, and then click Properties.
CAName is the name of the CA.
At the CAName Properties dialog box, click the Exit Module tab, and then click Add.
In the Set Active Exit Module dialog box, select CLM Enterprise Exit Module, and then click OK.
In the CAName Properties dialog box, on the Exit Module tab, in Exit Modules, select CLM Enterprise Exit Module, and then click Properties.
In the Configuration Properties dialog box, type the connection string for the SQL Server that hosts the CLM database, and then click OK.
If the SQL Server database that you use is not on the same computer as the CLM exit module, enter the name of the remote SQL Server. If you use SQL Integrated Authentication, and ILM CMS is not installed on the same server as the CA, you must perform the following actions on the server running SQL Server. You must assign permissions for the CLM database to the CA account. To do so, perform the following actions:
Log on to the SQL Server Management console as a database administrator.
In the console tree, expand the CLM database, and then click Logins.
On the Action menu, click New Login.
On the General tab, click the ellipses button (…) to find the name of the server where you installed the CA.
Select the name of the server where you installed the CA, and then click OK.
The selection dialog box closes, and ILM CMS applies the domain name for the server where you installed the CA as the default domain name. Verify that Authentication is set to Windows Authentication and that Security access is set to Grant access; these are the default settings.
Select the Database Access tab, And then click permit for the CLM database.
In Database roles for CLM, select permit for public and clmApp.
This setting ensures that the CLM exit module has the appropriate permission to write to the CLM database.
In the Configuration Properties dialog box, click OK.
In the CAName Properties dialog box, click OK.
Note
For configuration changes to take effect, you might have to restart Certificate Services.
Configure the CLM policy module
To configure the CLM policy module, you must have the Manage CA permission for the local CA.
To configure the CLM policy module
Click Start, point to Administrative Tools, and then click Certification Authority.
In the Certification Authority snap-in, right-click CAName, and then click Properties.
CAName is the name of the CA.
In CAName Properties, click the Policy Module tab, and then click Select to designate the Active Policy Module.
In the Set Active Policy Module dialog box, select CLM Enterprise Policy Module and then click OK.
On the Policy Module tab of the CAName Properties dialog box, click Properties.
In the Configuration Properties dialog box, on the General tab, select Pass non-CLM requests to the default policy module for processing.
In the Configuration Properties dialog box, on the Default Policy Module tab, click Properties.
In the Default Policy Module dialog box, select Follow the settings in the certificate template, if applicable. Otherwise, automatically issue the certificate, and then click OK.
In the Configuration Properties dialog box, click OK.
Important
The following procedure is optional and will configure the CLM policy module to only accept signed requests from defined certificates.
To configure the CLM policy module to only accept signed requests from defined certificates
Open Registry Editor.
To do this click Start, click Run, type regedit, and then click OK.
In Registry Editor, locate the following registry key: HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Services/CertSrv/clm.policy.
Right-click clm.policy, point to New, and then click Multi-String Value.
Name the new value CERTVALIDHASHES.
Right-click CERTVALIDHASHES, and then click Modify.
In Edit Multi-String, type the certificate hashes (without spaces) that are trusted by the CA policy module. (Separate certificate hashes with a semicolon.)
Note
ILM CMS uses the CLM Agent account to sign all CA request data.
Right-click clm.policy, point to New, and then click DWORD Value.
Name the new DWORD value CERTVALIDATIONFLAGS.
Right-click CERTVALIDATIONFLAGS, and then click Modify.
In Edit DWORD Value, under Value data, type a flag value.
Table 5 shows the possible values.
Note
By default, ILM CMS signs and verifies all requests to the CA policy module.
Table 5 Possible values for the CERTVALIDATIONSFLAGS key
Value | Setting |
---|---|
CAPICOM_CHECK_NONE |
0 |
CAPICOM_CHECK_TRUSTED_ROOT |
1 |
CAPICOM_CHECK_TIME_VALIDITY |
2 |
CAPICOM_CHECK_SIGNATURE_VALIDITY |
4 |
CAPICOM_CHECK_ONLINE_REVOCATION_STATUS |
8 |
CAPICOM_CHECK_OFFLINE_REVOCATION_STATUS |
16 |
CAPICOM_CHECK_COMPLETE_CHAIN |
32 |
CAPICOM_CHECK_NAME_CONSTRAINTS |
64 |
CAPICOM_CHECK_BASIC_CONSTRAINTS |
128 |
CAPICOM_CHECK_NESTED_VALIDITY_PERIOD |
256 |
CAPICOM_CHECK_ONLINE_ALL |
495 |
CAPICOM_CHECK_OFFLINE_ALL |
503 |
Configure additional policy modules
You may want to configure additional policy modules for ILM CMS to control certificate subjects and to support certificate requests that are generated outside of ILM CMS.
To configure additional policy modules
Log on to the CLM server with a user account assigned the Manage CA permission for the local CA.
Click Start, point to Administrative Tools, and then click Certification Authority.
In Certification Authority, right-click the certification authority and then click Properties.
In CAName Properties, on the Policy Module tab, click Properties to install and configure a custom module.
In Configuration Properties, on the Custom Modules tab, click the Add button.
In Open, locate the Microsoft.CLM.PolicyModulePlugins.dll file, and then click Open.
The default location for the file is %ProgramFiles%\Microsoft Certificate Lifecycle Manager\CA.
In Clm Policy Module, select a policy module. Table 6 shows the available policy modules.
In Custom Module Name, provide a unique name for the policy module, and then click OK.
To modify the policy module's properties, in Configuration Properties, select the policy module and click Properties.
Table 6 CLM policy modules
Policy module | Description |
---|---|
Certificate SMimeCapabilities Module 1.0 |
Limits the available encryption algorithms that you can use when you use a certificate for Secure/Multipurpose Internet Mail Extensions (S/MIME). This module is also called the S/MIME Capabilities policy module. |
Certificate Subject Module 1.0 |
Inserts a custom subject into a certificate. This module is also called the Subject policy module. |
SubjectAltName Module 1.1 |
Inserts a custom field into a certificate's SubjectAltName value. This module is also called the Subject Alternative Name policy module. |
Support for non-CLM certificate requests |
Registers ILM CMS certificates that are issued outside of ILM CMS. Examples include auto-enrollment and Microsoft Management Console (MMC). This module is also called the Non-CLM Request policy module. |
Configure the S/MIME Capabilities policy module
You can use the S/MIME Capabilities policy module to limit the available encryption algorithms that you can use when you use a certificate for S/MIME. Your organization can exclude available algorithms that you might consider weak or unsuitable for use.
To configure the S/MIME Capabilities policy module
In the Custom Module Properties dialog box, in Filter, select the certificate template that you want to use for S/MIME.
In Provider, click Configure.
In the S/MIME Capabilities dialog box, provide the object identifier (also known as OID) of the SMIMECapabilities extension list algorithms that an S/MIME user supports.
Each algorithm has a number that uniquely identifies it. This number, called the object identifier, contains several numbers that are dot-delimited. Table 7 shows the algorithms and their corresponding object identifiers.
Table 7 CLM 2007 algorithms and object identifiers
Algorithm | Object identifier |
---|---|
RC2-CBC |
1.2.840.113549.3.2 |
RC4 |
1.2.840.113549.3.4 |
DES-CBC |
1.3.14.3.2.7 |
DES-EDE3-CBC |
1.2.840.113549.3.7 |
Some algorithms have parameters that can be passed to them. Parameters can be any ASN1 object. For example, RC2 can have the key length passed to it.
Table 8 shows example settings.
Table 8 Sample CLM 2007 algorithm settings
Algorithm | Setting | Description |
---|---|---|
3DES |
1.2.840.113549.3.7[] |
Specifies 3DES in the SMimeCapabilities extension. The object identifier is for 3DES. The empty square brackets indicate that no parameters are included. |
RC2 with a key length of 128 |
1.2.840.113549.3.2[0x02020080] |
Specifies RC2 with a key length of 128. The object identifier is for RC2. The parameter is a sequence of bytes in hexadecimal, where:
|
Multiple algorithms |
1.2.840.113549.3.2[0x02020080]; 1.2.840.113549.3.4[0x02020080]; 1.3.14.3.2.7[]; 1.2.840.113549.3.7[] |
Use semicolons to separate multiple algorithms.
|
Configure the Subject policy module
You can use the Subject policy module to insert a custom subject into a certificate.
To configure the Subject policy module
In the Custom Module Properties dialog box, in Filter, select the certificate template to configure.
In Provider, click Configure.
In the Certificate Subject Name dialog box, type the information that you want to include in the certificate subject, for example, cn={User!givenName} {User!surName}, cn={CLM!UserID}, ou=People, c=CA.
You must use specific tags to dynamically build a certificate subject from the Active Directory user attributes and from the ILM CMS registration data. Table 9 shows these tags.
Table 9 Subject policy module certificate subject tags
Tag | Description |
---|---|
{User!ActiveDirectoryAttribute} |
Displays the name of a user in Active Directory using an Active Directory attribute, such as givenName. |
{CLM!ItemName} |
Displays the name of a ILM CMS data collection item. |
Configure the Subject Alternative Name policy module
You can use the Subject Alternative Name policy module to populate custom subject alternative names for certificates.
To configure the Subject Alternative Name policy module
In the Custom Module Properties dialog box, in Provider, click Configure.
In the Certificate SubjectAltName Configuration dialog box, click Add.
In the SubjectAltName Add Entry dialog box, in Type, select a type.
Table 10 shows the types that you can choose.
In Value, select a format, type information in the Value Template box, and then click OK.
Table 11 shows value template types.
In the Certificate SubjectAltName Configuration dialog box, click OK.
In the Custom Module Properties dialog box, in Filter, select a certificate template to apply the policy module to, and then click OK.
Note
The SubjectAltName Add Entry dialog box has two sections. One section specifies the type of subject alternative name, and the other section identifies the value that appears in the certificate.
Table 10 shows the formats for the subject alternative name that ILM CMS supports.
Table 10 Possible SubjectAltName types
SubjectAltName types | Description |
---|---|
RFC822Mailbox |
Formats the value as an e-mail address. |
DNSName |
Formats the value as a DNS name. |
OtherName |
Enables you to specify the subject alternative name by an object identifier (also known as OID). |
Important
You must provide the object identifier because it must be included in the certificate.
You must specify a value for each SubjectAltName type. Table 11 shows the value formats.
Table 11 SubjectAltName type value formats
Format | Description |
---|---|
UTF8String |
Typically, this format stores any data that contains Unicode characters, for example, an e-mail address or a URL. |
IA5String |
Typically, this format is any alphanumeric string. This includes any ASCII characters. |
You must enter information in the Value Template box to associate the data to the value of SubjectAltName in the certificate for the user. You can obtain these values from Active Directory or from the CLM database.
Use the following format for the information in the Value Template box: {User!ActiveDirectoryAttribute}. ActiveDirectoryAttribute is the attribute value in Active Directory. Table 12 shows sample values.
Table 12 Sample Active Directory values
Sample Active Directory value | Description |
---|---|
{User!email} |
Returns the value for the mail attribute of the user for whom the certificate is being issued. |
{CLM!ItemName} |
Returns the data collection item in the ILM CMS data. |
{CLM!dataItem1} |
Adds a data item to the subject alternative name if the enrollment policy included a data collection item, such as an employee number, that was the first collection item. |
Configure the Non-CLM Request Policy Module
You can use the CLM Web site to manage certificates when you use ILM CMS to register certificates that are issued outside of ILM CMS.
To configure the non-CLM Request policy module
In the Custom Module Properties dialog box, in Provider, click Configure.
In the AutoEnroll Plugin Configuration dialog box, in Database Information, type the connection string for the CLM database.
In Profile Template, select the profile template to be assigned to non-CLM requests from the list.
In Active Certificates, specify the maximum number of certificates, and then click OK.
In the Custom Module Properties dialog box, in Filter, select a certificate template to apply the policy module to, and then click OK.
Deploy multiple CAs for CLM 2007
The CLM Configuration Wizard performs the following primary configuration tasks on CAs automatically:
Grants the required user rights to the CLM Agent, CA Manager, and Enrollment Agent user accounts.
Enables key archival for the default Key Recovery Agent certificate.
You can use the CLM Configuration Wizard for the CA that you deploy first. However, when you deploy other CAs, you must manually grant permissions to the CLM Agent, CLM CA Manager, and the CLM Enrollment Agent user accounts.
Note
You may rename the default ILM CMS user accounts.
You must grant each CLM agent user account the required permissions to ensure that the user account is correctly configured for ILM CMS. Table 13 shows the CLM agent user accounts and corresponding required permissions.
Table 13 CLM agent user accounts and required CA permissions
CLM agent user account | Permission |
---|---|
clmAgent (CLM Agent) |
Issue and Manage Certificates |
clmCAMngr (CLM CA Manager) |
Manage CA |
clmEnrollAgent (CLM Enrollment Agent) |
Read Request Certificates |
Important
You must assign the required permissions on every CA in your organization, including the new CA.
To assign CA permissions to a CLM agent user account
Log on to the CA as a domain administrator.
Click Start, point to Administrative Tools, and then click Certification Authority.
In the console tree, right-click CAName, and then click Properties.
In CAName Properties, click the Security tab.
In Group or user names, select the CLM agent user account that you want to adjust permissions for, and then, in Permissions for UserName, select the permission.
Table 13 shows the permissions that you must configure for the CLM agent user accounts.
Click OK when you are finished.
To deploy subsequent CAs for CLM 2007
Log on to the new CA as an administrator assigned the Manage CA permission.
Click Start, point to Administrative Tools, and then click Certification Authority.
Right-click the CA, and then click Properties.
On the Key Recovery Agent tab, select Archive the key, click Add, and then select the key recovery agent certificate issued to the clmkragent user account.
Note
This certificate should exist in the personal store of the clmkragent on the CLM Web server.
Restart the CA.
Configuring Active Directory Users and Groups
For information about how to perform basic user and group tasks, see the following articles:
Create a new user account (https://go.microsoft.com/fwlink/?LinkID=88431)
Add a member to a group (https://go.microsoft.com/fwlink/?LinkID=88434)
Create a new computer account (https://go.microsoft.com/fwlink/?LinkID=88437)
By default, ILM CMS uses the Active Directory infrastructure and supports three user roles. Table 14 shows these roles.
Table 14 User roles in CLM 2007
User role | Description |
---|---|
user |
Any authenticated user in ILM CMS. |
certificate manager |
A user who is granted at least one ILM CMS management extended permission. |
administrator |
A certificate manager who is granted permission to edit profile templates. |
You should add users and certificate managers to groups to reflect their respective roles. You can create multiple groups for each role, and you can create new application roles by selectively granting ILM CMS management extended permissions. Immediately after you add a certificate managers group to the Security tab for a users group, you must grant the certificate managers group ILM CMS management extended permissions for that users group.
Create a users group for CLM 2007
We recommend that you use a users group to configure ILM CMS permissions and roles. Using a user group ensures that you are setting permissions globally for your users and makes it easier to manage user permissions in Active Directory.
To create a users group for CLM 2007
Click Start, point to Administrative Tools, and click Active Directory Users and Computers.
In the console tree, click the Users container or the organizational unit (OU) where you want to create the new group.
Right-click the Users container or OU, point to New, and then click New Group.
In New Group, provide a relevant, unique name for the group.
Under Group Scope, select either Global or Universal.
Under Group Type, select Security.
Note
You must use security groups to configure extended permissions.
Important
ILM CMS does not support domain local groups.
You can now grant the group extended permissions and permissions. To finish enrollment, the certificate subscribers group requires Read permission and the ILM CMS Request Enroll extended permission for a certificate template.
Create a certificate managers group
To create a certificate managers group, you create a new group in Active Directory, and then assign this group all or a subset of the available ILM CMS management extended permissions.
To create a certificate managers group
Click Start, point to Administrative Tools, and click Active Directory Users and Computers.
In the console tree, click the Users container or the OU where you want to create the new group.
Right-click the Users container or OU, point to New, and then click New Group.
On the New Group dialog box, type a relevant, unique name for the group.
Under Group Scope, select either Global or Universal.
Under Group Type, select Security.
Note
You must use security groups to configure extended permissions.
Important
ILM CMS does not support domain local groups.
You can now grant ILM CMS extended permissions to the new group. For information about how to do this, see Configure permissions for the certificate managers group. To grant a certificate managers group the ability to manage ILM CMS functionality for a users group, you must first create a users group.
If your Active Directory deployment contains multiple domains, you can use a combination of universal and global groups. You can do this by granting extended permissions and user rights to the single universal group, and then adding each domain’s global group to the membership of the universal group.
Configuring CLM 2007 Access Control
You must carefully adjust access control in ILM CMS to ensure that the proper users and groups can complete their tasks. You can use the topics in this section to assist you with defining your ILM CMS access control requirements.
CLM extended permissions
Configuring access control for users and groups
Required access control settings for specific users
CLM extended permissions
To enable detailed control of ILM CMS management delegation, ILM CMS uses a set of extended permissions that are added to Active Directory through schema extension. Table 15 shows these extended permissions.
Table 15 CLM 2007 extended permissions added through schema extension
Extended permission | Description |
---|---|
CLM Audit |
Enables generation and display of CLM policy templates, defining management policies within a profile template, and generating ILM CMS reports. |
CLM Enroll |
Enables the user to specify the workflow and the data to be collected while issuing certificates using the template. Note This extended permission only applies to profile templates. |
CLM Enrollment Agent |
Enables the user or group to request certificates on behalf of another user. The issued certificate’s subject contains the target user’s name, not the requestor’s name. The user or group assigned the CLM Enrollment Agent permission does not perform the enrollment. The enrollment is performed by the Enrollment Agent account on behalf of the user requesting the operation. Note Although the Active Directory extended permission is not implemented in ILM CMS, the enrollment agent role in the CLM Web site is functional. |
CLM Request Enroll |
Enables the initiation, execution, or completion of an enrollment request. |
CLM Request Recover |
Enables the initiation of encryption key recovery from the CA. The user or group who is assigned the CLM Request Recover permission does not perform the actual recovery. The recovery is performed by the Key Recovery Agent account on behalf of the user requesting the operation. |
CLM Request Renew |
Enables the initiation, execution, or completion of a renew request. The renewal request replaces a user’s certificate that is near its expiration date with a new certificate with a new validity period. |
CLM Request Revoke |
Enables the revocation of a certificate before the expiration of the certificate’s validity period. For example, this can be necessary if a user’s computer or smart card is compromised (stolen). |
CLM Request Unblock Smart Card |
Enables a smart card’s user PIN to be reset. This enables key material on a smart card to be reestablished. |
Extended permissions assignment locations
When you assign permissions in a ILM CMS environment, there are five permission assignment locations that determine a requesting user's authorization level. When you define a management policy workflow, you must determine whether permissions are necessary at each of these locations.
Important
Omitting a required permission assignment at any of these locations can result in a workflow failure within a management policy.
Table 16 shows locations where you can assign extended permissions.
Table 16 Where you can assign extended permissions
Permissions assignment location | Description |
---|---|
Service connection point |
Determines whether a user is assigned a management role within the ILM CMS deployment. For example, if a user must initiate requests for other users, the user is assigned the CLM Request Enroll permission at the service connection point. |
Profile template object |
Determines whether a user is a certificate subscriber or a certificate manager and whether the user can enroll certificates based on the profile template. If a user is required to enroll certificates based on the profile template, the user must be assigned the CLM Enroll permission on the profile template. |
Users or groups |
Determines a user's user role. A user or group who is assigned a management role within the ILM CMS environment must have permissions assigned on the users and groups that they will manage in the environment. For example, if you want to enable a manager to recover certificates issued to members of the EFS Users group, you must assign either the manager or a group that contains that manager the CLM Request Recover permission on the EFS Users group. Note EFS is Encrypting File System. |
Certificate templates |
Determines which users or groups can successfully submit enroll and renewal requests to the CA. These users must be assigned the Read permission and the CLM Request Enroll permissions on all certificate templates in a profile template. |
Management policy |
Determines a user's management role in ILM CMS. The user or group must be assigned the applicable management role in the management policy. For example, if you want the user to approve enrollment requests, you must assign the user the ability to approve enroll requests in the enroll management policy. |
Note
All users who participate in the ILM CMS workflow require Read permission on the service connection point to enable them to read the permission assignments. If a user does not have Read permission, that user cannot access the CLM Web site.
Important
To enable the user to recover encryption certificates, you must assign the CLM Request Recover permission on the service connection point and to the EFS Users group. If you assign the CLM Request Recover permission only to the EFS User group and not on the service connection point, certificate managers cannot recover encryption certificates.
Configuring access control for users and groups
To configure access control for ILM CMS, you must perform one of the following tasks:
Configure permissions for the CLM 2007 users group
Configure permissions for the certificate managers group
Configure permissions on a new profile template object
Configure sharing permissions on a profile template object
Configure permissions for the CLM 2007 users group
The ILM CMS users group requires Read permissions on the profile template.
To set permissions for the CLM 2007 users group
Click Start, point to Administrative Tools, and then click Active Directory Users and Computers.
In the console tree, locate the OU or container that contains the ILM CMS users group.
Right-click the ILM CMS users group, and then click Properties.
On the Security tab, click Add, and then add the ILM CMS users group.
Set the required permissions for the appropriate ILM CMS transactions, and then click OK.
To view any CLM profile templates, the certificate subscribers group needs Read permissions for ILM CMS enroll transactions on all existing profile template objects in Active Directory.
To grant the CLM 2007 users group Read permission on the profile template objects
Click Start, point to Administrative Tools, and then double-click Active Directory Sites and Services.
In Active Directory Sites and Services, click View, and then click Show Services Node.
This option remains enabled after you close the console.
In the console tree, expand Services, expand Public Key Services, and then click Profile Templates.
Right-click Profile Templates, and then click Properties.
On the Security tab, click Add.
In Select Users and Groups, add the certificate subscribers group, and then click OK.
On the Security tab, verify that the certificate managers group has Read permissions assigned, and then click OK.
Configure permissions for the certificate managers group
The first three steps of the following procedure depend on where you created the directory entry that Active Directory uses to store ILM CMS configuration information. The following procedure assumes that you used the default directory entry settings.
To grant permissions to a certificate managers group
Click Start, point to Administrative Tools, and then click Active Directory Users and Computers.
On the View menu, click Advanced Features.
Verify that the check box next to Advanced Features is selected.
This check mark indicates that the advanced features are enabled in MMC.
In the console tree, expand DomainName, and then click the System container.
DomainName is the name of the domain.
Expand System, expand Microsoft, expand Certificate Lifecycle Manager, and then click CLMServer
CLMServer is the NetBIOS name of the server hosting ILM CMS.
Right-click CLMServer, and then click Properties.
On the Security tab, add the certificate managers group, and then grant the group CLM extended permissions.
ManagersGroup is the name of the certificate managers group.
ILM CMS uses software-based certificates and hardware-based certificates. For hardware-based certificates that reside on a smart card, you must set suitable permissions (Allow/Deny) for ILM CMS to function correctly.
For more information about CLM extended permissions, see CLM extended permissions.
To view CLM profile templates, the certificate managers group must have Read permissions on profile template objects in Active Directory.
To assign Read permissions on profile template objects for the certificate managers group
Click Start, point to Administrative Tools, and then click Active Directory Sites and Services.
On the View menu, verify that Show Services Node is selected.
In the console tree, expand Services, and then expand Public Key Services.
Right-click Profile Templates, and then click Properties.
On the Security tab, click Add.
In Select Users and Groups, add the certificate managers group, and then click OK.
On the Security tab, verify that the certificate managers group has Read permissions assigned, and then click OK.
Configure permissions on a new profile template object
To set permissions on a new CLM profile template, you must be a member of the Enterprise Admins group or a member of the root domain's Domain Admins group in Active Directory.
Note
You can create a new profile template by copying an existing template that is close to the configuration of the new template that you want, and then configuring the new template's properties.
To configure permissions on a new profile template
Click Start, point to Administrative Tools, and then click Active Directory Sites and Services.
On the View menu, verify that Show Services Node is selected.
In the console tree, expand Services, expand Public Key Services, and then click Profile Templates.
In the details pane, right-click a profile template, and then click Properties.
On the Security tab, make any necessary permission changes, and then click OK.
Even though profile templates might contain Version 2 certificate templates that can be created and duplicated in Microsoft® Windows Server® 2003, Standard Edition, certificates based on Version 2 templates can only be issued by a certification authority running Microsoft® Windows Server® 2003, Enterprise Edition or Microsoft® Windows Server® 2003, Datacenter Edition.
To use Active Directory Sites and Services on a computer that is not a domain controller, you install Windows Administration Tools (Adminpak.msi). (An example of a computer that is not a domain controller is one running on Windows 2000 Professional.) Computers running on Windows 2000 can install Adminpak.msi from the Windows 2000 installation CD. Computers running on Windows XP and Windows Server 2003 must install Adminpak.msi from a Windows Server 2003 installation CD or by downloading Adminpak.msi from the Microsoft Web site.
After you duplicate a profile template object, you must add your user or group and verify that the permissions are modified.
Configure sharing permissions on a profile template object
By default, ILM CMS assigns Read permissions to any new groups that you add to the Security tab of a CLM profile template. It is up to you to adjust a security group's permissions based on its relevant roles.
Table 17 Profile template object sharing permissions for CLM 2007 groups
Group | Permission |
---|---|
users group |
You must assign the Read permission and the CLM Request Enroll permission to the users group. Subscribers use the permissions to read the properties and settings of the template, and to enroll any certificate templates included in the profile template. |
certificate managers group |
You must assign the Read permission and the Write permission to the certificate managers group. |
Required access control settings for specific users
For ILM CMS to function correctly, you must configure six users. These users can be configured either fully or partially by the CLM Configuration Wizard. If you decide to manually configure the users, or need information about what access control settings the CLM Configuration Wizard affects, you must use the required access control settings. Table 18 shows these settings for specific CLM agent user accounts.
Note
The CLM Configuration Wizard automatically creates these agent user accounts and their passwords, but you can use custom user names and passwords.
Table 18 Required access control settings for CLM agent user accounts
CLM agent user account | Description |
---|---|
CLM Agent |
Provides the following services:
This user has the following access control settings:
|
Key Recovery Agent |
Recovers archived private keys from the CA. This user has the following access control settings:
|
Authorization Agent |
Determines user rights and permissions for users and groups. This user has the following access control settings:
|
CA Manager Agent |
Performs CA management activities. This user must be assigned the Manage CA permission. |
Web Pool Agent |
Provides the identity for the IIS application pool. ILM CMS runs within a Microsoft Win32® application programming interface process that uses this user’s credentials. This user has the following access control settings:
This account must also be trusted for delegation. |
Enrollment Agent |
Performs enrollment on behalf of a user. This user has the following access control settings:
|