[Deprecated] Public Key Infrastructure
Warning: This documentation is out-dated, newest version of the documentation is available at https://gazelle.ihe.net/gazelle-documentation/Gazelle-Security-Suite/user.html
Gazelle platform offers its own public key infrastructure : Gazelle PKI. The main use case of this tool is the delivery of signed certificates (and its associated key pair) to all registered participant for a testing session. All thoses certificates are issued by a common certification authority (CA), and participant will just have to add this CA to their trust-store. It is the easier way to set up a trusted cluster dedicated to secured connection testing. Out of this cluster, certificates have no value. Also, PKI provide certificates to the TLS simulator that can be used in any other testing purpose. Finally, PKI comes with a certificate validator accessible trough the user interface and through a Web Service.
In the case of the European connectathon, generated certificates are signed by the IHE Europe certification authority.
Certificate request
Users can request a certificate for testing :
- Once logged, go to "PKI" > "Request a certificate"
- Fill out the form, following fields are required to be provided :
- Certificate type : basic
- the country (from the drop-down list)
- the organization
- the common name (system keyword is OK)
- Finally, hit the "request" button.
Then tool administrators are informed and will process it shortly. To retrieve your request and check its status, go to "Certificates" > "List Certificate requests".
If the request is accepted, the certificate will be generated and signed by the certificate authority of the tool. Finally a notification will be sent to your profile in Gazelle Test Management. You will be able to found the certificate in the list of all certificates "PKI" > "List Certificates", or associated with the request in the list of all requests "PKI" > "List certificate requests".
Depending of the configuration of the tool, certificates can also be immediately signed without administration review. Whether it's the case, you will be redirected to the newly created certificate.
Certificates can be downloaded in various format: PEM and DER. The key pair (private and public) of the certificate you have request for is also available in PEM.
Note that you can also generate a keystore in p12 and JKS (java keystore) formats.
Certificate Validator
Gazelle PKI tool also embeds a certificate validator. You can thus check the conformity of your certificates against several profiles.
- Go to "PKI" > "Certificate validation".
- Load the certificate in PEM/CRT format,
- then select a context and a validator.
Each available validator use the basic certificate validator first and then validate the certificate against specific rules.
- Revokation can also be verified.
- Click on "Validate" to execute the validation.
The result will be displayed on the page. Gazelle Security Suite does not store any validation result.
Certificate validation can also be used from EVSClient. Certificate validators are filtered by context and are dispatch over the menu. The advandage of using EVSClient is the generation of a validation report and its permanent storage.
Request a certificate for Gazelle Single-Sign on service
Gazelle platform has a single-sign on service in order to prevent the user to create a new login in each of the tools offered by the testbed. Read more about this service at : http://gazelle.ihe.net/content/gazelle-single-sign-authentication-users
In each of the tools offered by Gazelle platform, when you use the "CAS login" link, you are asked to provide your CAT credentials. In order to bypass the entering of your credentials, you can, in some Internet browser, import a certificate which will be used to silently authenticate yourself.
To generate this certificate, go to "PKI" > "Install browser certificate for CAS auto-login". Also read http://gazelle.ihe.net/content/cas-autologin