To manage agents, create the following certificates:

  • CM Agent CA  a root certificate required to issue certificates to user workstations where Agents are deployed.
  • CM Agent SSL an authentication certificate signed by root certificate. This certificate is required to establish a two-way secure connection between the CertiFlow server and the workstation where Agent is deployed. 
  • Workstation certificate – a certificate, which is issued automatically when a client agent is registered. To be able to assign tasks to a workstation, the CertiFlow server verifies the authenticity of a workstation certificate. Once the certificate is verified, the server adds this workstation to the trusted list. 

To create agent certificates:

  1. Run the Cm.Agent.Cert.Generator.exe utility on the Axidian CertiFlow server. 
  2. Generate root and SSL certificates with the following parameters:

/root generates a root certificate. 
/rootKeySize (optional) sets a private key length for root certificate. Default value is 4096 bits, other supported values are from 512 to 8192 bits.
/sn <DNS server name> generates an SSL certificate for the specified DNS server name.
/csn generates an SSL certificate for the server where the utility is running.
/sslKeySize (optional) sets a private key length for an SSL certificate. Default value is 2048 bits by default, other supported values are from 512 to 4096 bits.
/pwd (optional) sets a password for an SSL certificate.
/installToStore (optional) publishes issued certificates to the server's certificate storages:

    • CM Agent CA certificate is published to Trusted Root Certification Authorities.
    • CM Agent SSL certificate is published to the Personal certificates storage of the workstation where Axidian CertiFlow server is deployed.

You can also generate an SSL certificate via existing root certificate. Use the following parameters: 

/rootKey sets the path to the root certificate file.
/ssl
generates an SSL certificate. 
/sn <DNS server name>
generates an SSL certificate for the specified DNS server name.
/csn
– generates an SSL certificate for the server where the utility is running.
/pwd
(optional) sets a password for SSL certificate.
/sslKeySize
(optional) sets a private key length for SSL certificate. Default value is 2048 bits, other supported values are from 512 to 4096 bits.
/installToStore
(optional) publishes issued SSL certificates to the Personal certificates storage of the workstation where Axidian CertiFlow server is deployed.

Example
Cm.Agent.Cert.Generator.exe /root /csn /installToStore

The following files should appear in the utility directory: 

  • agent_root_ca.json root certificate with private key in JSON format.
  • agent_root_ca.cer agent root certificate.
  • agent_root_ca.key private key of agent root certificate.
  • agent_ssl_cert.cer agent SSL certificate.
  • agent_ssl_cert.key private key of agent SSL certificate.
  • agent_ssl_cert.pfx SSL certificate with private key in PFX format. 

If you have multiple Axidian CertiFlow servers with Agents, each server must have a specific SSL certificate. To issue an SSL certificate, use the CM Agent CA root certificate. Root certificate must be the same for all servers.

To create an SSL certificate for another server or to renew an expired certificate:

  1. Transfer the directory with Cm.Agent.Cert.Generator utility and the agent_root_ca.json file to the server.
  2. Run the following command:
Cm.Agent.Cert.Generator.exe /rootKey <path to agent_root_ca.json file> /ssl /sn <DNS server name Axidian CertiFlow> /installToStore

Configuring secure connection to the agent services site

  1. Open the IIS Manager, select Axidian CertiFlow Agent Site and go to Bindings...
  2. Select binding to 3003 port and click Edit...
  3. Define CM Agent SSL as SSL certificate and click OK.

3003 port is set by default. If you use another port, create and configure a new binding for this port. The port must be open to incoming connections in the firewall.

SSL/TLS certificate can be an RSA certificate issued by any trusted CA for Axidian CertiFlow server:

  • Subject should contain the Common name value (FQDN of the system server).
  • Subject Alternative Name should contain the DNS Name value (FQDN of the system server). E.g. certiflow.demo.local or *. demo.local as a Wildcard certificate.
  • Enhanced Key Usage should contain the Server Authentication (1.3.6.1.5.5.7.3.1) value.


  • No labels