Requesting Personal Certificates
(→Importing Certificates/Private Keys) |
Jpr@uab.edu (Talk | contribs) (Add section for secure email communication) |
||
(12 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
− | == Personal | + | == Obtaining and Using Personal Grid Certificates through OSG == |
+ | |||
+ | Now that SURAgrid is a formally supported Virtual Organization within the Open Science Grid, we are able to offer our users the opportunity to obtain and use personal X.509 grid certificates directly if needed. | ||
+ | |||
+ | Note that if your institution is a member of InCommon AND is certified at the InCommon "Silver" member, you can also use the separate CILogon service to obtain a grid credential using your university's single-sign-on system, which might be easier than the process outlined below. | ||
+ | |||
+ | In either case, you will need to follow the instructions to register your grid certificate into the SURAgrid VOMS (virtual ORganization Membership Service) also, as outlined below. | ||
You are '''<u>STRONGLY</u>''' encouraged to use '''''Firefox for both Windows or Macintosh''''' as your web browser. In order to get your personal OSG certificate, you need to complete the following steps:<br> | You are '''<u>STRONGLY</u>''' encouraged to use '''''Firefox for both Windows or Macintosh''''' as your web browser. In order to get your personal OSG certificate, you need to complete the following steps:<br> | ||
− | #Point your web browser to the URL [http:// | + | #Point your web browser to the URL [http://oim.grid.iu.edu/oim/certificaterequestuser https://oim.grid.iu.edu/oim/certificaterequestuser].<br> |
− | # | + | #Enter your contact information in the <font color="green">Contact Information</font> field. |
− | + | #Enter your profile information in the <font color="green">Profile Information</font> field. | |
− | #Enter your | + | #Enter a password to be used for issuing your certificate and encrypting your private key. ('''IMPORTANT: If you forget this password, you will not be able to issue your certificate and import it your browser after it is approved.''') |
− | #Enter your | + | #Select <font color="green">SURAGrid</font> from the pick list in the <font color="green">Sponsor</font> field.<br> |
− | #Select <font color="green">SURAGrid</font> from the pick list in the <font color="green"> | + | #Specify a person who can verify your identity by phone or in person. This person will call you at the phone number you provide in your contact information, so make sure you are providing accurate information. We are working to get a registration authority (RA) at each campus that is a member of SURAgrid. Please include the name of the person who can verify your identity from the list below. If you have questions please contact the [mailto:suragrid@uab.edu SURAgrid] list. |
− | # | + | ## James A. Lupo at LSU |
− | # | + | ## Alan Sill at TTU |
− | # | + | ## Alain Deximo at TTU |
− | # | + | ## Steve Johnson at TAMU |
− | # | + | ## Amy Wang at TTU |
+ | #Check the <font color="green">"I AGREE"</font> box. | ||
#Click on the <font color="green">Submit</font> button. | #Click on the <font color="green">Submit</font> button. | ||
− | After you have submitted your request for an OSG certificate, your sponsor will receive an email from the OSG Certificate Registration Authority (run by the OSG Grid Operations Center or GOC) asking them to validate your request. | + | After you have submitted your request for an OSG certificate, your sponsor will receive an email from the OSG Certificate Registration Authority (run by the OSG Grid Operations Center or GOC) asking them to validate your request. After your request is approved, you will receive an email which contains a link to your certificate and private key. You need to download the file that contains your user certificate and key from the link to your local computer.('''IMPORTANT NOTE:''' You must use the '''<u>SAME</u>''' browser on the '''<u>SAME</u>''' computer that you used to request the certificate when you import the certificate and private key.) |
− | |||
− | === | + | === Importing Certificates/Private Key pair to your Web Browser === |
==== Firefox for Windows ==== | ==== Firefox for Windows ==== | ||
Line 26: | Line 32: | ||
It is recommended that you export your OSG certificate and private key as a PKCS#12 file. To export these items, follow the steps below:<br> | It is recommended that you export your OSG certificate and private key as a PKCS#12 file. To export these items, follow the steps below:<br> | ||
− | #Click on the | + | #Click on the <font color="green">Tools</font> option at the top of the browser. |
− | #Select | + | #Select <font color="green">Options</font> from the list. |
− | #Click on the | + | #Click on the <font color="green">Advanced</font> tab. |
− | #Click on the | + | #Click on the <font color="green">Encryption</font> tab. |
− | #Click on the | + | #Click on the <font color="green">View Certificates</font> button. |
− | #Click on the | + | #Click on the <font color="green">Your Certificates</font> tab. |
− | #Click on the | + | #Click on the <font color="green">Import</font> button. |
− | + | #Select the certificate from the directory where you saved it (the download location). | |
− | #Select the directory | + | #Click on the <font color="green">Open</font> button. |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | #Click the | + | |
− | + | Then you should see a message of "<font color="green">Successfully imported your security certificate and private key</font>". | |
− | |||
− | + | ==== Other Web Browsers ==== | |
− | + | To find the details for importing your user certificate to your web browser, please see the instructions through the following links. | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | #Importing User Certificate on Firefox [http://confluence.grid.iu.edu/display/CENTRAL/Importing+User+Certificate+on+Firefox https://confluence.grid.iu.edu/display/CENTRAL/Importing+User+Certificate+on+Firefox] | |
+ | #Importing User Certificate on IE [http://confluence.grid.iu.edu/display/CENTRAL/Importing+User+Certificate+on+IE https://confluence.grid.iu.edu/display/CENTRAL/Importing+User+Certificate+on+IE] | ||
+ | #Importing User Certificate on Chrome [http://confluence.grid.iu.edu/display/CENTRAL/Importing+User+Certificate+on+Chrome https://confluence.grid.iu.edu/display/CENTRAL/Importing+User+Certificate+on+Chrome] | ||
+ | #Importing User Certificate on Safari [http://confluence.grid.iu.edu/display/CENTRAL/Importing+User+Certificate+on+Safari https://confluence.grid.iu.edu/display/CENTRAL/Importing+User+Certificate+on+Safari] | ||
+ | #Importing User Certificate for Command Line Use [http://confluence.grid.iu.edu/display/CENTRAL/Importing+User+Certificate+for+Command+Line+Use https://confluence.grid.iu.edu/display/CENTRAL/Importing+User+Certificate+for+Command+Line+Use] | ||
− | |||
− | + | === Exporting Your Certificates/Private Key pair for use by Globus === | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | <tt></tt> | + | in order to use your OSG certificate and private key on grid resources or submit machines, copy your '''file_name.p12''' file to the '''''$HOME/.globus''''' directory [if you don't have a .globus directory, create one: mkdir .globus] on that machine, change its name to '''usercred.p12''' and set its permissions as follows: <br> <tt></tt> |
<tt> | <tt> | ||
Line 125: | Line 65: | ||
</tt> | </tt> | ||
− | + | <tt></tt> <br> User commands currently support both '''''p12''''' and '''''pem''''' certificates. There is no need to convert your p12 certificate. However, if you also want to have the certificate in .pem format, then run the following commands. The first one extracts your public key, the second extracts your private key. ('''NOTE:''' You will be prompted for your encryption password when executing these commands.)<br> <tt></tt> | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | <tt></tt> <br> User commands currently support both '''''p12''''' and '''''pem''''' certificates. There is no need to convert your p12 certificate. However, if you also want to have the certificate in .pem format, then run the following commands. The first one extracts your public key, the second extracts your private key. ('''NOTE:''' You will be prompted for your encryption password when executing these commands.)<br> | + | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | <tt></tt> | + | |
<tt> | <tt> | ||
Line 192: | Line 72: | ||
</tt> | </tt> | ||
− | + | <tt></tt> <br> You must set the protections on your two new '''''.pem''''' files correctly, otherwise '''''voms-proxy-init'''<u></u>'' will not use them.<br> <tt></tt> | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | <tt></tt> <br> You must set the protections on your two new '''''.pem''''' files correctly, otherwise '''''voms-proxy-init'''<u></u>'' will not use them.<br> | + | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | <tt></tt> | + | |
<tt> | <tt> | ||
Line 259: | Line 79: | ||
</tt> | </tt> | ||
− | < | + | <br> |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | === Using your certificate for email communication === | |
− | + | At times it may be necessary to send signed or encrypted emails to the OSG GOC or other members of the OSG. For example, you may want to confirm a colleages request for an OSG certificate which requires you digitally sign your email. Or, you may need to request support from the GOC and your email includes sensitive data. This requires you to encrypt your email to avoid intermediate parties from reading sensitive data. | |
− | + | The OSG Wiki has basic information on [https://twiki.grid.iu.edu/bin/view/Documentation/SecureEmail options for secure messaging]. The basic steps include: | |
+ | # Importing the [http://www.digicert-grid.com/ CA's from DigiCert] into your mail client. You need the''DigiCert Grid Root CA'' and ''DigiCert Grid CA-1'' | ||
+ | # Importing your OSG issued personal certificate | ||
+ | # Associating your certificate with your email account so it can be used to sign or encrypt and email | ||
+ | # Choosing to sign or encrypt your message when it is sent | ||
− | + | While setting up an email client to use S/MIME is generally not difficult you may run into non-obvious errors. This section is a collection of problems and potential solutions. | |
− | + | ==== Thunderbird ==== | |
− | + | Thunderbird users can follow [http://kb.mozillazine.org/Thunderbird_%3a_FAQs_%3a_Install_an_SMIME_Certificate Installing an S/MIME Certificate]. Be sure to at a miminum select the checkbox to "Trust this certificate to identify email users" when you import the DigiCert CA's. This is very important to getting Thunderbird to send signed or encrypted messages. It tends to get glossed over in import instructions. | |
− | + | If you feel you have everything set up in Thunderbird but are still seeing a message like: | |
+ | Sending of message failed. Unable to sign message. Please check that the certificates specified in Mail & Newsgroups Account Settings | ||
+ | for this mail account are valid and trusted | ||
− | + | This very likely means you have not told Thunderbird to trust DigiCert Grid CA-1 to identify mail users. You can check your trusts in the Preferences->Advanced->View Certificates->Authorities and select DigiCert Grid CA-1 and then press "Edit Trust...". Make sure "Trust this certificate to identify email users" is selected. | |
− | + | After you have made this change, you should be able to send signed and encrypted mail using your OSG certificate. | |
− | + | ||
− | + | ||
− | + |
Latest revision as of 14:41, 3 September 2013
Contents |
[edit] Obtaining and Using Personal Grid Certificates through OSG
Now that SURAgrid is a formally supported Virtual Organization within the Open Science Grid, we are able to offer our users the opportunity to obtain and use personal X.509 grid certificates directly if needed.
Note that if your institution is a member of InCommon AND is certified at the InCommon "Silver" member, you can also use the separate CILogon service to obtain a grid credential using your university's single-sign-on system, which might be easier than the process outlined below.
In either case, you will need to follow the instructions to register your grid certificate into the SURAgrid VOMS (virtual ORganization Membership Service) also, as outlined below.
You are STRONGLY encouraged to use Firefox for both Windows or Macintosh as your web browser. In order to get your personal OSG certificate, you need to complete the following steps:
- Point your web browser to the URL https://oim.grid.iu.edu/oim/certificaterequestuser.
- Enter your contact information in the Contact Information field.
- Enter your profile information in the Profile Information field.
- Enter a password to be used for issuing your certificate and encrypting your private key. (IMPORTANT: If you forget this password, you will not be able to issue your certificate and import it your browser after it is approved.)
- Select SURAGrid from the pick list in the Sponsor field.
- Specify a person who can verify your identity by phone or in person. This person will call you at the phone number you provide in your contact information, so make sure you are providing accurate information. We are working to get a registration authority (RA) at each campus that is a member of SURAgrid. Please include the name of the person who can verify your identity from the list below. If you have questions please contact the SURAgrid list.
- James A. Lupo at LSU
- Alan Sill at TTU
- Alain Deximo at TTU
- Steve Johnson at TAMU
- Amy Wang at TTU
- Check the "I AGREE" box.
- Click on the Submit button.
After you have submitted your request for an OSG certificate, your sponsor will receive an email from the OSG Certificate Registration Authority (run by the OSG Grid Operations Center or GOC) asking them to validate your request. After your request is approved, you will receive an email which contains a link to your certificate and private key. You need to download the file that contains your user certificate and key from the link to your local computer.(IMPORTANT NOTE: You must use the SAME browser on the SAME computer that you used to request the certificate when you import the certificate and private key.)
[edit] Importing Certificates/Private Key pair to your Web Browser
[edit] Firefox for Windows
It is recommended that you export your OSG certificate and private key as a PKCS#12 file. To export these items, follow the steps below:
- Click on the Tools option at the top of the browser.
- Select Options from the list.
- Click on the Advanced tab.
- Click on the Encryption tab.
- Click on the View Certificates button.
- Click on the Your Certificates tab.
- Click on the Import button.
- Select the certificate from the directory where you saved it (the download location).
- Click on the Open button.
Then you should see a message of "Successfully imported your security certificate and private key".
[edit] Other Web Browsers
To find the details for importing your user certificate to your web browser, please see the instructions through the following links.
- Importing User Certificate on Firefox https://confluence.grid.iu.edu/display/CENTRAL/Importing+User+Certificate+on+Firefox
- Importing User Certificate on IE https://confluence.grid.iu.edu/display/CENTRAL/Importing+User+Certificate+on+IE
- Importing User Certificate on Chrome https://confluence.grid.iu.edu/display/CENTRAL/Importing+User+Certificate+on+Chrome
- Importing User Certificate on Safari https://confluence.grid.iu.edu/display/CENTRAL/Importing+User+Certificate+on+Safari
- Importing User Certificate for Command Line Use https://confluence.grid.iu.edu/display/CENTRAL/Importing+User+Certificate+for+Command+Line+Use
[edit] Exporting Your Certificates/Private Key pair for use by Globus
in order to use your OSG certificate and private key on grid resources or submit machines, copy your file_name.p12 file to the $HOME/.globus directory [if you don't have a .globus directory, create one: mkdir .globus] on that machine, change its name to usercred.p12 and set its permissions as follows:
mv $HOME/.globus/file_name.p12 $HOME/.globus/usercred.p12 chmod 400 $HOME/.globus/usercred.p12
User commands currently support both p12 and pem certificates. There is no need to convert your p12 certificate. However, if you also want to have the certificate in .pem format, then run the following commands. The first one extracts your public key, the second extracts your private key. (NOTE: You will be prompted for your encryption password when executing these commands.)
openssl pkcs12 -in $HOME/.globus/file_name.p12 -clcerts -nokeys -out $HOME/.globus/usercert.pem openssl pkcs12 -in $HOME/.globus/file_name.p12 -nocerts -out $HOME/.globus/userkey.pem
You must set the protections on your two new .pem files correctly, otherwise voms-proxy-init will not use them.
chmod go-rw ~/.globus/userkey.pem chmod go-w ~/.globus/usercert.pem
[edit] Using your certificate for email communication
At times it may be necessary to send signed or encrypted emails to the OSG GOC or other members of the OSG. For example, you may want to confirm a colleages request for an OSG certificate which requires you digitally sign your email. Or, you may need to request support from the GOC and your email includes sensitive data. This requires you to encrypt your email to avoid intermediate parties from reading sensitive data.
The OSG Wiki has basic information on options for secure messaging. The basic steps include:
- Importing the CA's from DigiCert into your mail client. You need theDigiCert Grid Root CA and DigiCert Grid CA-1
- Importing your OSG issued personal certificate
- Associating your certificate with your email account so it can be used to sign or encrypt and email
- Choosing to sign or encrypt your message when it is sent
While setting up an email client to use S/MIME is generally not difficult you may run into non-obvious errors. This section is a collection of problems and potential solutions.
[edit] Thunderbird
Thunderbird users can follow Installing an S/MIME Certificate. Be sure to at a miminum select the checkbox to "Trust this certificate to identify email users" when you import the DigiCert CA's. This is very important to getting Thunderbird to send signed or encrypted messages. It tends to get glossed over in import instructions.
If you feel you have everything set up in Thunderbird but are still seeing a message like:
Sending of message failed. Unable to sign message. Please check that the certificates specified in Mail & Newsgroups Account Settings for this mail account are valid and trusted
This very likely means you have not told Thunderbird to trust DigiCert Grid CA-1 to identify mail users. You can check your trusts in the Preferences->Advanced->View Certificates->Authorities and select DigiCert Grid CA-1 and then press "Edit Trust...". Make sure "Trust this certificate to identify email users" is selected.
After you have made this change, you should be able to send signed and encrypted mail using your OSG certificate.