Share12 Digtcert Goody
Share12 Digtcert Goody
on z/OS
• RACDCERT is the primary administrative tool for managing digital certificates using RACF.
• TSO command shipped as part of RACF
• Command line interface with ISPF panels
• Certificates and Rings are protected
by RACF profiles
• Learn more:
– RACF Command Language Reference
• Certificate Generation:
– RACDCERT GENCERT – Generate key pair and certificate
– RACDCERT GENREQ – Generate a certificate request
• Certificate Installation:
– RACDCERT ADD – Install a certificate and public/private key
• Certificate Administration:
– RACDCERT LIST – Display certificate information from an installed
certificate
– RACDCERT ALTER – Change certificate installation information
– RACDCERT DELETE – Delete certificate and key pair
– RACDCERT CHECKCERT – Display certificate information from a
dataset
– RACDCERT EXPORT – Export a certificate
– RACDCERT REKEY – Renew certificate with new key pair
– RACDCERT ROLLOVER – Finalize the REKEY process
RACDCERT Commands
– Example:
RACDCERT CERTAUTH GENCERT SUBJECTDN(OU(‘Master CA’) O(‘IBM’) C(‘US’))
WITHLABEL(‘MyCA’)
Profile created: 00.OU=Master¢CA.O=IBM.C=US
RACDCERT ID(testid) GENCERT SUBJECTDN(OU(‘Test Dept’) O(‘IBM) C(‘US’))
WITHLABEL(‘TestCert’) SIGNWITH(CERTAUTH LABEL(‘MyCA’))
Profile created: 01.OU=Master¢CA.O=IBM.C=US
• A key ring is a collection of certificates that identify a networking trust relationship. Key Rings are used
to identify the certificates required to establish a connection to a peer.
• A certificate must be placed in a key ring before it can be used by middleware applications though the
RACF R_DataLib callable service.
• Key Ring Syntax for applications:
– <user-id>/<ring-name>
• Types of Certificates in RACF:
– User – Directly Associated with one z/OS user ID.
– CERTAUTH – Trusted CA certificate used to verify the peer entity's certificate.
– SITE – Certificates associated with an off-platform server or other network identity. SITE
certificates bypass the normal certificate chain validation. Private keys can be shared.
• Key Rings contain Certificate Usage – The usage assigned to a certificate when it is connected to a key
ring indicates its intended purpose.
– PERSONAL – Used to identify a local server application. Personal usage must be used to
get access to the private key.
– CERTAUTH – Used to verify the peer entity's certificate. Used to identify the local server's
CA certificate.
– SITE – Certificate associated with an off-platform server or other network identity. SITE
certificates bypass the normal certificate chain validation.
Virtual Key Rings
• A Virtual Key Ring is a set of certificates which are logically associated, but not
connected to a 'real' RACF key ring.
• There are three types of virtual key rings:
– CERTAUTH – All trusted CA certificates
• Syntax: *AUTH*/*
– SITE – All site certificates
• Syntax: *SITE*/*
– User - All certificates owned by a single user ID
• Syntax: <owning-id>/*
• Most common usage is the CERTAUTH virtual key ring.
– It is used when an application validates the certificates of others but has
no need for its own certificate and private key.
– Example: An FTP user who wants to establish a SSL encrypted
connection to a FTP server. As long as the CA certificate which issued
the FTP server's SSL certificate is a trusted CA certificate in RACF, the
CERTAUTH virtual key ring can be used.
RACF Key Ring Protection
• To set up a certificate for secure traffic the first time is only the beginning
• Must plan for the certificate life cycle
• Certificate expiration causes system outage
• Things to consider:
– How many certificates are actively used in the system?
– Categorize them:
• Certs locally created VS Certs by external provider
• Certs used to authenticate the incoming requests VS certs to
identify your servers to the other parties
– What CA certs will you trust?
– Each server will have its own ring and own cert or shared?
Certificate Life Cycle Planning (2 of 2)
• How to keep track of the expiration dates of all the certificates in the system?
– Spreadsheets?
– Utilities?
– Automation for renew?
– Use certificate management vendor products?
z/OS Key Ring exploiters
Exploiter Connect the server cert to the ring, Where/How to specify the
eg. ‘MYRING’
RACF Key Ring
FTP Server RACDCERT ID(FTPSVR) FTP.DATA file
CONNECT(LABEL(‘FTP Cert’)
RING(MYRING) DEFAULT) KEYRING MYRING
Note1 or
AT-TLS policy
TN3270 Server RACDCERT ID(TNSVR) Telnet profile file
CONNECT(LABEL(‘TN Cert’)
RING(MYRING) DEFAULT) KEYRING SAF MYRING
Note1 or
AT-TLS policy
IP Security (IPSEC) RACDCERT ID(IPSEC) Iked.conf file
CONNECT(LABEL(‘IPSEC Cert’)
RING(MYRING) DEFAULT) KEYRING MYRING
Note1 or
AT-TLS policy
HTTP Server RACDCERT ID(WEBSVR) httpd.conf file
CONNECT(LABEL(‘WEB Cert’)
RING(MYRING) DEFAULT) Keyfile MYRING SAF
• Example: A user wants to establish a secure FTP connection between their workstation and an
FTP server, but NOT use client authentication.
• User Key Ring:
– CA certificate which signed the FTP Server identity certificate
– Notes:
• No End entity certificate required
– (Other authentication method used such as User ID & Password)
• No Private keys required
• On z/OS the CERTAUTH Virtual Key Ring can be used if the FTP server is signed by
a CERTAUTH certificate
• The FTP Server Key Ring:
– FTP Server Identity Certificate (with access to private key)
– CA Certificate which signed the FTP Server Identity Certificate
• Example: A user wants to establish a secure FTP connection between their workstation
and an FTP server and use client authentication to authenticate to the server.
• User Key Ring:
– User Identity Certificate (with access to private key)
– CA Certificate which signed the User Identity Certificate
– CA Certificate which signed the FTP Server Identity Certificate
• The FTP Server Key Ring:
– FTP Server Identity Certificate (with access to private key)
– CA certificate which signed the FTP Server Identity Certificate
– CA certificate which signed the User Identity Certificate
Administrator
rejec
t
Approves the
s
request
Certificate Expires
Or
Administrator or
User Revokes
CA Generates and
Certificate distributes
certificate
Owner uses the
certificate
32
Certificate Authority on z/OS:
PKI Services
• PKI Services provides full certificate life cycle management
– Request, create, renew, revoke certificates
– Provides certificate status:
• Certificate Revocation List (CRL)
• Online Certificate Status Protocol (OCSP)
– Generation and administration of certificates via
customizable web pages
– Support Simple Certificate Enrollment Protocol (SCEP)
for routers to request certificates automatically
– Automatic notifications or renewal of expiring
certificates
Review
Session 11623