Skip to content

Certificate and Key Management

Host Verification Service Certificates and Keys

The Host Verification Service has several unique certificates not present on other services.The HVS certificates can be found under <nfs_path mentioned in values.yaml>/isecl/hvs path.


Note Please refer detail steps on running setup task and updating specific service on Changing Configuration Settings section. To know about supported HVS setup task and configurations refer HVS Setup Task and Configuration Settings section. To know about supported Trust Agent setup task and configurations refer Trust Agent Setup Task and Configuration Settings section.


SAML

The SAML Certificate is used to sign SAML attestation reports, and is itself signed by the Root Certificate. This certificate is unique to the Verification Service.

<nfs_path mentioned in values.yaml>/isecl/hvs/config/certs/trustedca/saml-cert.pem

When the SAML certificate is regenerated, all hosts will immediately be added to a queue to generate a new attestation report, since the old signing certificate is no longer valid.

If the Integration Hub is being used, the new SAML certificate will need to be imported to the IHub.

Asset Tag

The Asset tag Certificate is used to sign all Asset Tag Certificates. This certificate is unique to the Verification Service.

<nfs_path mentioned in values.yaml>/isecl/hvs/config/certs/trustedca/tag-ca-cert.pem

Privacy CA

The Privacy CA certificate is used as part of the certificate chain for creating the Attestation Identity Key (AIK) during Trust Agent provisioning. The Privacy CA must be a self-signed certificate. This certificate is unique to the Verification Service.

The Privacy CA certificate is used by Trust Agent nodes during Trust Agent provisioning; if the Privacy CA certificate is changed, all Trust Agent nodes will need to be re-provisioned.

<nfs_path mentioned in values.yaml>/isecl/hvs/config/certs/trustedca/privacy-ca/privacy-ca-cert.pem

Endorsement CA

The Endorsement CA is a self-signed certificate used during Trust Agent provisioning.

<nfs_path mentioned in values.yaml>/isecl/hvs/config/certs/endorsement/EndorsementCA.pem

TLS Certificates


TLS certificates for each service are issued by the Certificate Management Service during installation. If the CMS root certificate is changed, or to regenerate the TLS certificate for a given service:

  • To download CMS root CA certificate execute setup task download-ca-cert
  • To Generate Key pair and CSR, gets it signed from CMS execute setup task download-cert-tls

Note Refer Changing Configuration Settings section to run required setup tasks.