![]() KEK GRID CA 2024 Enrollment Manual
Version 1.0
2025-08-27
1. CA Service Application
1.1. Submitting Application Form
Users can request a KEK Grid CA service account via the Online Application Portal, ccPortal. All users must submit an application form and a copy of the user's (high resolution) photo ID to the Administration Office of the KEK Computing Research Center by the system. It is desirable that the user's photo ID is issued by the user's home institute. If it is not possible, a copy of your ID from the home institute in addition to one copy of a public photo ID can be submitted instead. Your personal information (including a copy of photo ID) is used exclusively for the purpose of managing your account and issued certificates, and in particular, vetting your identity by a face-to-face or video conferencing interview. 1.2. Identification and Interview
After receiving an application form, KEK GRID RA examines it according to CP/CPS document, and interviews the applicant. The interview is scheduled based on an agreement between the RA and the applicant. The interview can be either face-to-face or through video conference.
1.3. AuthorizationIf the application is approved by the interview, the KEK GRID RA will inform the KEK GRID CA 2024 that the request has been approved. The KEK GRID CA 2024 then creates a username and a password, which will be used to obtain a certificate from the CA system. The initial password is set to 10 digits random characters. The username and the initial password will be able to retrieve from ccPortal. You should change the initial password as soon as you receive it and keep in mind your changed password.
2. Managing User Account
2.1. Change User's PasswordTo change your password, visit Password Management Service with your favorite web browser. The KEK GRID CA 2024 requires a user to keep her/his password more than 10 digits long. 2.2. Change User's Common NameIf you want to change your Common Name (CN), please contact consult@kek.jp.
3. Setting up Command Line Interface (CLI)
User can use the CLI for KEK GRID CA 2024 on your computer system. The CLI communicates with the KEK GRID CA 2024 through the public Internet.
If your client node is placed behind a firewall, please ensure that the firewall is configured so that transmissions are allowed to/from KEK GRID CA 2024 services:TCP ports 80, 443, 2560 on 130.87.6.224 / 2001:2f8:3e:6::224 and TCP ports 443, 11417 on 130.87.6.225 / 2001:2f8:3e:6::225
3.1. KEK GRID CA 2024 CLI InstallationUsing KEKCC: As the CLI is already installed on the KEKCC work server in /opt/kek/caclt, the following procedure is not required. In case you use the CLI in an environment other than KEKCC: User have to install a CLI package which is a modified version of the NAREGI-CA software. The NAREGI-CA software supports various UNIX platforms, however, the CLI has been tested on following Linux platforms only:
After downloading the CLI package, you can install it in the following way (You can change the installation directory ("/opt/kek/caclt" in the example below) to whereever you like. The default is "/usr/local". CAUTION: The following steps will overwrite the previsous version if you specify the same directory):
4. Obtaining a Certificate
4.1. Obtain a User Certificate with KEK GRID CA 2024 CLI
The following files should be created under current working directory:
You have to set appropriate permissions on userkey.pem (400) and usercert.pem (644). Under usual Grid environment, these files are supposed to be placed in $HOME/.globus directory. 4.2. Obtaining a Host/Service Certificate
In order to issue host/service certificates, a special permission has to be given to your account.
4.2.1. Generation of One-time License CodeA one-time license is required to request issuing a Globus host/service certificate. You can get it with a web browser which supports a HTML form submission:
4.2.2. Obtain Certificates with KEK GRID CA 2024 CLI
Execute "certreq" with the options below
or $ /opt/kek/caclt/bin/certreq issue -lic a_onetime_license_code -lcert -fqdn hostname "-fqdn hostname" is a mandatory option when you obtain host/ldap certificates.
If you want to have a 2nd organizational unit (OU) field in the subject of a host/ldap certificate, you should execute "certreq" with the following options;
The following files will be created under current working directory:
Please note that certreq overwrites certificates and key files (hostcert.pem and hostkey.pem or ldapkey.pem and ldapcert.pem) in current working directory. You have to set appropriate ownership (usually root) and permissions on hostkey.pem (400) and hostcert.pem (644). Under usual Grid environment, these files are supposed to be placed in /etc/grid-security/ directory. 5. Updating CertificatesCertificates can be updated by either (5.1) rekeying or (5.2) revoking old one and then issuing new one.5.1. Rekey certificatesFor user certificate:You can rekey your certificate, i.e. issue a new one with the same subject as the current one if the certificate will expire in less than 90 days. Note that the old certificate is valid until the expiration date and you will receive email notifications until the old certificate expires or is revoked. (The old certificate can be revoked from the Web enroll page as described in Section 6.2.)
You can rekey your certificate, i.e. issue a new one with the same subject as the current one if the certificate will expire in less than 90 days. Note that the old certificate is valid until the expiration date and you will receive email notifications until the old certificate expires or is revoked. (See Section 6 for revocation of the certificate.)
5.2. Revocation and ReissuanceYou can revoke the old certificate and reissue new one with following steps:6. Revoking Certificates
There are two ways to revoke a certificate. 6.1. Using KEK GRID CA 2024 CLI
"certreq" command has a function to revoke a certificate. Revocation using the CLI needs a set of files as below:
You need to specify relative/absolute file names if these are not in current working directory:
6.2. Using Web BrowserYou can revoke an issued certificate at the KEK GRID CA 2024 service with a web browser.
Detailed procedures are illustrated in Revocation of User certificate and Revocation of Host certificate
i. Appendix A: Converting a CertificateTo import a certificate into browsers, the certificate should be in PKCS12 encrypted form.You can convert the certificate by using openssl command as follows: $openssl pkcs12 -export -legacy -in usercert.pem -inkey userkey.pem -out user.p12where user.p12 is the name of your converted file. In this command, you will be prompted for Pass Phrase and Export Password. Pass Phrase is the pass phrase of your key file. Export Password is the password for exporting the certificate to browsers. The PKCS12 file can be converted to the PEM files by using the following openssl commands: $openssl pkcs12 -in user.p12 -clcerts -nokeys -out usercert.pem $openssl pkcs12 -in user.p12 -nocerts -out userkey.pem ii. Appendix B: Import a Certificate to BrowsersThis section shows how to import the certificate (in p12) to your browsers. Several combinations of major browsers and OSes are covered here.= Microsoft Edge 134.0.3124.72 (Windows 11) open Settings -> Privacy,search,and services -> Security -> Manage certificates click import and enter the filename = Firefox 136.0.2 (Windows 11) open Settings -> Privacy & Security under Certificates, click View Certificates ->Your Certificates click import and enter the filename = Firefox 128.9.0 (Linux) open Settings -> Privacy & Security under Certificates, click View Certificates ->Your Certificates click import and enter the filename = Chrome 134.0.6998.118 (Windows 11) open Settings -> Privacy and security -> Security -> Manage Certificate -> Manage imorted certificates from Windows click import and enter the filename = Chrome 134.0.6998.117 (Linux) open Settings -> Privacy and security -> Security -> Manage Certificate click import and enter the filename = Safari 18.1 (MacOS Sequoia) Doubleclick your certificate file (.p12) or open Terminal (Application -> Utility -> Terminal), then type "open [your-cert-file (in .p12)]" (Keychain Access is invoked,) enter the password (passphrase) (With Keychain Access (Application -> Utility -> Keychain Access), you should have the certificate in your login keychain.) Powered by NAREGI CA Ver 3.3 User Enroll Service modified by KEK. |