Entrust and You New Version
Entrust and You New Version
Entrust and You New Version
1
Where to get assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Have comments/suggestions/questions? . . . . . . . . . . . . . . . . . . . . . 28
Telephone, email, and online support . . . . . . . . . . . . . . . . . . . . . . . . 28
Training and certification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Advising on PKIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Single SSL Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Entrust Certificate Managed Service . . . . . . . . . . . . . . . . . . . . . . . . . 32
Further information on PKI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2
Welcome to Entrust PKI
3
What can Entrust PKI do for me?
Entrust software secures digital identities and information, so that you can place
trust in all forms of electronic transactions. Trust can be established through user
authentication, digital signatures, and the protection of confidential information.
Every organization has security needs, but not all organizations’ needs will be the
same. Possible security needs include:
• personal document security
• email security
• document/email origin and time verification
• secure software and hardware transmission
• simple and transparent function on the network
In addition to providing these services for their users, an organization’s planners
and administrators may have security requirements such as:
• security policy management
• roaming user support
• user-based self-registration and administration
• secure communications and transactions over a network
• controlled resource access for employees, customers, or partners
• secure remote access using Virtual Private Networks (VPN)
• secure access to enterprise resource planning (ERP) software
• secure wireless device communication
• cryptographic hardware device security enforcement
• customized security solutions using software toolkits
The solution that can address all of these security needs? A PKI.
Data security using the encryption key pair and symmetric keys
The encryption key pair, used in conjunction with symmetric keys, keeps data
secure. The encryption key pair consists of:
• a public key - used only for “locking” (encrypting) data, known as the
encryption public key
• a private key - used only for “unlocking” (decrypting) data, known as the
decryption private key
Encrypting and decrypting data through the use of a public-private encryption
key pair is known as asymmetric cryptography, or as it is more popularly known,
public-key cryptography.
5
The additional keys used for data security are known as symmetric keys. A
symmetric key is like a physical key people use in their daily lives — the same key
is used to lock and unlock items. A symmetric key is used for both encrypting and
decrypting data. This process is known as symmetric cryptography. The primary
benefit of symmetric encryption is speed. Because of this, symmetric algorithms
are especially suited to encrypting and decrypting large amounts of data.
Symmetric key
3 The sender then forwards both the encrypted data and the encrypted symmetric
key to its intended recipient.
4 The recipient receives the encrypted data and the encrypted symmetric key, and
“unlocks” the symmetric key (decrypts it) with their decryption private key.
Note: Remember that since the sender locked the symmetric key using the
recipient’s encryption public key, only the recipient’s decryption private key is
capable of unlocking it.
7
5 The recipient uses the symmetric key to decrypt the data.
Hash function
applied to data
Normal data Hash code
2 The sender then encrypts the hash code with their signing private key.
3 The sender forwards the data and the encrypted hash code (the signature) to the
intended recipient.
How can the encrypted hash code be considered a signature? The encrypted
hash code is an item that only the sender, using a signing private key, could have
produced.
The next series of steps describes verification of the signature and confirmation
that the data has not been altered since it was signed.
9
1 Upon receipt of the data and the encrypted hash code, the recipient has to verify
that the hash code was encrypted by the sender. This is done by decrypting the
hash code using the sender’s verification public key.
2 At the same time, a new hash code is created from the received data.
Hash function
applied to data
Received data New hash code
3 The new hash code and the decrypted hash code are compared. If the hash codes
match, the recipient knows that the data has not been altered.
How do matching hash codes indicate that the data was not altered since the
signature was created?
Note: Remember that a digital signature guards data against modification, but
it does not prevent unauthorized eyes from viewing the data. To protect data
against unauthorized access, you must also encrypt the data.
Digital Certificates
Using public and private keys to encrypt and sign data raises an important
security-related question: how can you be sure that the public key you are using
belongs to the right person?
The solution: associate the public key and its user with a digital certificate.
Certificate
11
Certification Authority
A digital certificate associates a public key with an individual user.
But how do you know that the information in the certificate is valid? How do you
know that the correct public key has been associated with its rightful user?
The solution: have the information in all certificates verified by a Certification
Authority.
Certification Authority
Certification Authority
Signs certificates
If Bob or Alice trust the Certification Authority, they can be sure that the certificates
signed by it are associated with their rightful owners. With this trust established,
encryption can take place, with the sender knowing that only the intended recipient
will be able to decrypt the data. Verification can take place, with the recipient
knowing that only the signer could have signed the data.
Public-key infrastructure
A public-key infrastructure (PKI) is a framework that provides security services to
an organization using public-key cryptography. These services are:
• implemented across a networked environment
• used in conjunction with client-side software
• customized by the organization implementing them
13
An added bonus provided by a PKI system is that all security services are provided
transparently—users do not need to know about public keys, private keys, digital
certificates, or Certification Authorities in order to take advantage of the services
provided by a PKI.
In addition to providing integrity of digitally signed data and protection of
encrypted data, a fully functional PKI must provide a number of core services.
These are outlined in Figure 1.
Certificate retrieval
from a certificate Establishing trust
repository with other PKIs
Non-repudiation
Certificate of digitally
revocation signed data
Certificate revocation
The users of the PKI must be able to verify whether a certificate is still trustworthy
at the time of use. If a certificate is no longer trustworthy, it must be revoked by
the Certification Authority. The certificate revocation mechanisms are designed
to publish information about certificates revoked by the Certification Authority in
a publicly available list (known as a certificate revocation list, or CRL). If a user
attempts to use a revoked certificate, they will be informed that use of the
certificate is no longer considered secure.
Note: One key that should never expire is the decryption private key. This key
may be needed in the future to access old encrypted data.
15
Establishing trust with other PKIs
Sometimes users in a PKI community must exchange sensitive communications
with users in other PKI communities. For example, two trading partners, each
with their own Certification Authority, may want to validate certificates issued by
the other partner’s Certification Authority. Two ways of creating extended
third-party trust among users of different PKIs include:
• Peer-to-peer trust—trust is created through two or more Certification
Authorities securely exchanging their verification public keys, which are used
to verify each Certification Authority’s signature on certificates. By signing
each other’s verification public key, each Certification Authority creates a
certificate for the other Certification Authority—thus allowing their users to
trust the other Certification Authority. This creates a “peer-to-peer” level of
trust among the various cross-certified Certification Authorities.
• Hierarchical trust—trust is created through establishing a “root of trust”
among Certification Authorities. Hierarchical trust of Certification Authorities
(also known as a strict hierarchy) is a way of arranging two or more
Certification Authorities in a restrictive trust relationship. A Certification
Authority that’s in a hierarchy has its Certification Authority certificate signed
by its direct superior. A superior may be the root of a hierarchy, or some level
of subordinate beneath the root. The pattern of superiors signing their
subordinates’ certificates eventually converges at the root, which signs its
own Certification Authority certificate. Each subordinate is at the end of a
certificate chain that begins with the root’s certificate. In effect, all
Certification Authorities and users in a hierarchy can trust each other,
because they all share a trust anchor (at the root of the hierarchy).
Client software
Client software is used to support all of the elements of a PKI discussed above.
Running from the user’s desktop, client software makes trust decisions (for
example, whether to use a particular encryption public key contained within a
particular certificate to encrypt data) based on signed information that is
provided by the PKI. Client software provides security services consistently and
transparently across applications on the desktop.
17
Entrust Authority™ Security Manager
In Entrust PKI, the role of Certification Authority is held by Entrust Authority™
Security Manager. The Security Manager can be thought of as the “engine” of
Entrust PKI. The main functions of the Security Manager are to:
• create certificates for all public keys
• maintain a secure database of Entrust PKI information that can allow the
recovery of users’ key pairs (in case a user forgets their password, for
example)
• enforce the security policies defined by your organization
Access to Entrust Authority™ Security Manager is provided through Entrust
Authority™ Security Manager Control and Entrust Authority™ Security Manager
Administration.
Note: For information requests and network traffic across Entrust PKI, the
Directory is the most frequently accessed component.
19
Managing Entrust PKI
Entrust PKI provides a division of responsibilities to maintain a high level of
security, as shown in Figure 3. Supporting this division of responsibilities is a
variety of distinct user roles, capable of carrying out the full range of tasks within
Entrust PKI. The default administrator roles in Entrust PKI include Master User,
Security Officer, Administrator, Directory Administrator, and Auditor. The
default non-administrator role is an end user.
Master Users
Security Officers
End Users
Master User
This role is for three highly trusted people who, along with a Security Officer,
install and configure Entrust PKI. Master Users are the only users who can use
Entrust Authority™ Security Manager Master Control. Master Users perform
system-level operations involving Entrust Authority™ Security Manager,
including starting and stopping Entrust Authority™ Security Manager.
Documentation used by Master Users is:
• Entrust Authority™ Security Manager Operations Guide for Windows
• Entrust Authority™ Security Manager Operations Guide for Unix
Note: Unlike other default roles, you can’t modify the Master User role or use
it as a basis for creating custom roles.
Security Officer
This role is for a few highly trusted people in your organization who will use
Entrust Authority™ Security Manager Administration to administer sensitive
Entrust PKI operations. The first Security Officer is created when you initialize
Entrust PKI. Security Officers set the security policy for your organization’s PKI,
and supervise administrators.
Security Officers use Entrust Authority™ Security Manager Administration to
perform tasks such as:
• setting up Entrust PKI so that its operations conform to your organization’s
policies and procedures regarding security
• managing other administrator accounts
• establishing trust relationships with other Certification Authorities
Documentation used by Security Officers is:
• Entrust Authority™ Security Manager Administration User Guide
You can modify this role by changing its name, the number of authorizations
required for sensitive operations, and its user policy certificate. This role can be
used as a basis for creating a custom role.
21
Administrator
This role is for any number of trusted people in your organization. For
convenience, and depending on the size and nature of your user community, you
may wish to have several Administrators. Administrators administer end users.
Administrators use Entrust Authority™ Security Manager Administration to
perform tasks such as:
• adding, removing, and deactivating end users
• revoking end user certificates
• recovering end users
Documentation used by Administrators is:
• Entrust Authority™ Security Manager Administration User Guide
You can modify this role by changing its name, the number of authorizations
required for sensitive operations, and its user policy certificate. This role can also
be used as a basis for creating a custom role.
Directory Administrator
This role is for any number of trusted people in your organization. Directory
Administrators perform tasks that modify information listed in the Entrust PKI’s
Directory.
Directory Administrators use the Directory Browser tool in Entrust Authority™
Security Manager Administration to perform tasks such as:
• adding and deleting entries in the Directory, either in batch mode or one at
a time
• adding, changing, and deleting attributes in Directory entries
Documentation used by Directory Administrators consists of:
• Entrust Authority™ Security Manager Administration User Guide
You can modify this role by changing its name, the number of authorizations
required for sensitive operations, and its user policy certificate. This role can also
be used as a basis for creating a custom role.
End user
This role is for non-administrative Entrust users. End users cannot log in to Entrust
Authority™ Security Manager Administration. End users can be either people
(members of your organization) or things (a Web site, a wireless device)—the
qualification being that they are granted a certificate for use within your PKI.
Documentation used by end users consists of user guides and online help which
accompany the Entrust product they are using.
You can modify this role by changing its name and user policy certificate. This
role can also be used as a basis for creating a custom role.
On the client side, the person’s name and keys are encrypted, and stored as a
profile. The Entrust profile is a secure file that contains a user’s keys and digital
certificates. Note that roaming end users do not need to carry their profiles. You
can create roaming users if your organization has Entrust Authority™ Roaming
Server.
23
Deployment issues and considerations
Setting up a PKI to suit your security goals involves making numerous decisions
before installing any software. To assist your organization in this decision making,
Entrust offers a step-by-step approach to deployment known as the “Entrust
Deployment Methodology.” The Entrust Deployment Methodology guides
organizations in successfully planning and implementing their Entrust security
solution.
Entrust Professional Services also offer services that support this deployment
methodology. These services provide PKI planning and implementation to
organizations who want to jump-start their Entrust security solution.
Figure 4 provides an overview of the Entrust Deployment Methodology.
2. Requirements 5. Deployment
analysis and
design
3. Development 4. Installation,
and testing integration,
and testing
25
Installation, integration, and testing
In this phase your organization installs all components of the PKI. All operations
are closely monitored. Installation, integration, and testing involves:
• installing network, firewall, hardware, operating system, and third-party
software components
• installing Entrust Ready Directory and Web software
• installing Entrust software and supporting hardware
• integrating back-end systems
• testing all functionality
Deployment
Deployment involves running your PKI in a pilot program, followed by full
rollout. Deployment consists of:
• engaging the pilot user community
• running the pilot for four to six weeks
• monitoring PKI usage and feedback
• monitoring operations staff, registration authorities, help desk staff, and
performance
• enhancing the PKI environment as required
• initiating full rollout
27
Where to get assistance
We are always interested in your experiences using Entrust PKI and its related
products and services.
Have comments/suggestions/questions?
We are continually trying to improve the quality and coverage of information
related to Entrust PKI. If you have any comments or questions about any aspect
of Entrust PKI, send us an email at
[email protected]
General inquiries can be directed to the following telephone numbers:
• Tel: 1-972-713-5800
• Fax: 1-972-713-5805
• Sales inquiries: 1-888-690-2424
Telephone support
For telephone support, simply call the appropriate number listed in your
Customer Resource Kit. The Customer Resource Kit is a package made available
to customers after the Entrust TrustedCare program has been purchased. You
must provide your Unique ID (listed on your TrustedCare account) whenever you
call.
For support telephone numbers outside of North America:
• Platinum Level:
https://www.entrust.com/trustedcare/contact/platinum.htm
• Silver/Gold level:
https://www.entrust.com/trustedcare/contact/gold_silver.htm
Toll Free:
• From North America: 1-877-754-7878
29
Training and certification
Through a variety of hands-on and eLearning materials, Entrust delivers effective
training in deploying, operating, administering, extending, customizing and
supporting any variety of Entrust digital identity and information security
solutions.
Hands-On Training
Delivered by training professionals, Entrust Training courses help equip you with
the knowledge you need to help speed your deployment of digital identity and
information security services.
The following is a list of courses currently available through the training
department, and the products that they cover.
eLearning
The Entrust Enterprise Desktop Solutions eLearning courses provide a highly
effective, simple to manage, and low cost training solution. This interactive
learning tool makes it possible to train numerous users in any number of locations
quickly, simultaneously, and consistently. To learn more about Entrust eLearning,
visit
http://www.entrust.com/training/elearning.htm
Advising on PKIs
In order to operate a PKI that performs to its greatest potential, Entrust
recommends that you consult the Entrust Professional Services department.
Professionals experienced in the areas of PKI planning, implementation, and
deployment are available to provide a number of useful services, including:
• PKI security consulting
• PKI planning and deployment using the Entrust Deployment Methodology
• systems integration
• an in-sourcing program
To contact Professional Services about these or other offerings (such as obtaining
the Entrust PKI Deployment Methodology Manual), please call Entrust at
1-888-690-2424
31
Services
Entrust Certificate Services provide both single SSL Certificates and a Managed
service.
33
34 Introduction to Entrust PKI
Index encrypting 6
locking 6
security through the encryption key pair 5
database
See Entrust Authority Security Manager database
decryption
A about 7
decryption key
administrative roles 20 See decryption private key
Administrator decryption private key 5
about 22 keeping data secure using a 5
documentation used 22 See also decryption
tasks 22 deployment 26
advising on PKIs 31 See also deployment issues and considerations
associating users and keys with certificates 11 deployment issues and considerations
asymmetric cryptography 5 about 24
Auditor See also Entrust Deployment Methodology
about 23 deployment manual
documentation used 23 See Entrust Deployment Methodology Manual
tasks 23 development and testing 25
automatic update of key pairs and certificates 15 See also deployment issues and considerations
digital signature
about 8, 16
B non-repudiation of digitally signed data 16
backing up See also signing private key, verification public key
data in the Entrust Authority Security Manager Directory
database 19 about 19
keys 15 information that is made public 19
See also certificate retrieval from a certificate repository
Directory Administrator
C about 22
documentation used 22
CA
tasks 22
See Certification Authority
documentation
certificate
for Administrators 22
about 11
for Auditors 23
automatic update of 15
for Directory Administrators 22
retrieval from a certificate repository 15
for End Users 23
revocation 15
for Master Users 21
Certification Authority
for Security Officers 21
about 12
enabling trust 15
services provided by 12 E
signing certificates 12
client software 16 eLearning 31
core components of Entrust PKI 17 enabling
creating new administrative and end-user roles 20 trust through a Certification Authority 15
cryptography 5 encryption
customer support about 6
See support See also encryption key pair, symmetric-key
cryptography
encryption key
D See encryption public key
encryption key pair
data
Index 35
about 5 hash code 9
data security 5 hierarchical trust 16
See also encryption public key, decryption private key
encryption public key
keeping data secure using an 5 I
See also encryption installation, integration, and testing 26
End User See also deployment issues and considerations
about 23
documentation used 23
Entrust K
customer support 28
key
sending comments to 28
backup 15
Entrust Authority Security Manager
history 15
about 18
recovery 15
access to 18
See also encryption public key, decryption private key,
used by 21
signing private key, verification public key
Entrust Authority Security manager
services performed 18
Entrust Authority Security Manager Administration L
about 18
tasks used for 18 locking data
used by 22, 23 See encryption
Entrust Authority Security Manager Control
about 18
Entrust Authority Security Manager database
M
about 19 managing Entrust PKI 20
data stored in 19 See also Entrust PKI
Entrust Deployment Methodology 24–27 Master User
Entrust Deployment Methodology Manual about 21
about 27 documentation used 21
obtaining 31 tasks 21
Entrust PKI
about 4, 17
core components 17 N
managing 20 networks
Entrust Security Manager Control as used by a PKI 13
tasks used for 18 traffic on 19
used by 18 non-repudiation of digitally signed data 16
Entrust Trusted Care 28 See also digital signature
establishing trust with other PKIs 16
O
G
operations and maintenance 26
getting assistance See also deployment issues and considerations
See support
glossary
see Further information on PKI 33 P
guaranteeing information in certificates
peer-to-peer trust 16
See Certification Authority
PKI
See public-key infrastructure
H private key
See decryption private key, signing private key
Hands-On Training 30 profile 23
security
about 4 W
requirements for
what can Entrust do for you 4
individuals 4
organizations 4
planners and administrators 4
through cryptography 5
Security Officer
about 21
documentation used 21
tasks 21
Security Toolkit for the Java Platform 30
sending comments to Entrust 28
services
Entrust Certificate Services 32
signing digital signatures
See digital signature
signing key
See signing private key
Index 37
38 Introduction to Entrust PKI