summaryrefslogtreecommitdiffstats
path: root/dogtag-9.0/kra-configure.sh
blob: 366c4a39b4680200804f79509a54511724a0f7be (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
#!/bin/sh -x

PKI_DEV_SRC=`cd .. ; pwd`

INSTANCE_NAME=pki-kra
PASSWORD=Secret123
PIN=`grep preop.pin= /var/lib/$INSTANCE_NAME/conf/CS.cfg | awk -F= '{ print $2; }'`

REALM=EXAMPLE-COM
CERTS=/var/lib/$INSTANCE_NAME/certs
rm -rf $CERTS
mkdir -p $CERTS

pkisilent ConfigureDRM \
        -cs_hostname "$HOSTNAME" \
        -cs_port 10443 \
        -preop_pin "$PIN" \
        -client_certdb_dir "$CERTS" \
        -client_certdb_pwd "$PASSWORD" \
        -token_name "internal" \
        -sd_hostname "$HOSTNAME" \
        -sd_admin_port 9443 \
        -sd_ssl_port 9443 \
        -sd_agent_port 9443 \
        -sd_admin_name "caadmin" \
        -sd_admin_password "$PASSWORD" \
        -domain_name "$REALM" \
        -subsystem_name "Data Recovery Manager" \
        -ldap_host "localhost" \
        -ldap_port "389" \
        -base_dn "ou=kra,dc=example,dc=com" \
        -db_name "example.com-$INSTANCE_NAME" \
        -bind_dn "cn=Directory Manager" \
        -bind_password "$PASSWORD" \
        -remove_data true \
        -key_type rsa \
        -key_size 2048 \
        -signing_algorithm SHA256withRSA \
        -drm_transport_cert_subject_name "CN=DRM Transport Certificate,O=$REALM" \
        -drm_storage_cert_subject_name "CN=DRM Storage Certificate,O=$REALM" \
        -drm_server_cert_subject_name "CN=$HOSTNAME,O=$REALM" \
        -drm_subsystem_cert_subject_name "CN=DRM Subsystem Certificate,O=$REALM" \
        -drm_audit_signing_cert_subject_name "CN=DRM Audit Signing Certificate,O=$REALM" \
        -ca_hostname "$HOSTNAME" \
        -ca_port 9180 \
        -ca_ssl_port 9443 \
        -backup_fname "$CERTS/kra-server-certs.p12" \
        -backup_pwd "$PASSWORD" \
        -admin_user "kraadmin" \
        -agent_name "kraadmin" \
        -admin_email "kraadmin@example.com" \
        -admin_password "$PASSWORD" \
        -agent_key_size 2048 \
        -agent_key_type rsa \
        -agent_cert_subject "CN=kraadmin,UID=kraadmin,E=kraadmin@example.com,O=$REALM"

echo $PASSWORD > "$CERTS/password.txt"
PKCS12Export -d "$CERTS" -o "$CERTS/kra-client-certs.p12" -p "$CERTS/password.txt" -w "$CERTS/password.txt"

systemctl restart pki-krad@$INSTANCE_NAME.service