PKI Bootstrap. Will generate a new "PKI Lifecycle" package. An entire PKI chain of trust can be managed by the "PKI Lifecycle" package.
Go to file
JohnE d3af83080f MOD: more serious re-org to support the new PKI Lifecycle gerneration 2018-08-12 14:08:31 -07:00
docs MOD: more serious re-org to support the new PKI Lifecycle gerneration 2018-08-12 14:08:31 -07:00
src MOD: more serious re-org to support the new PKI Lifecycle gerneration 2018-08-12 14:08:31 -07:00
.gitignore MOD: initial commit 2018-08-02 11:09:21 -07:00
README MOD: moving functions to a seperate script, organizing and modifying the lifecycle scripts 2018-08-08 12:30:59 -07:00

README

      ============================
        Certificate Generation
          Version 3.x
      ============================


-------------
  INTRO
-------------

This package contains a set of programs to generate an entire certificate chain of trust
 and will configure StrongSwan server. .p12 files are generated for client distribution.

There are two main applications contained in this project.
  * MOB Hub System : PKI Bootstrap
    - 1 x Certificate Authority (CA) generation
    - 5 x CA Intermediate generation
    - 10 x Server and Client certificate generation (based on CA-I)
    - CA, CA-I, Server, and Client certificate packaged as .p12 file for easy import to Android (other clients too)

  * MOB Hub System : PKI Lifecycle
    - Unlimited CA Intermediate generation
    - Unlimited Server and Client generation (based on CA-I)



---------------------
  VERSIONS
---------------------

Ver 3.2 - MOB Hub PKI Lifecycle
  * PKI Lifecycle
    - generate certificates during the CA's lifecycle
Ver 3.1 - MOB Hub PKI Bootstrap
  * PKI Bootstrap
    - generate an entire chain-of-trust
Ver 3.0 - CA Intermediate Support
  * requires openssl  (does not require ipsec)
  * CA Intermediate support
    -root CA can be generated with 5-10yr expiration, put into cold-storage
  * small to large organizational support



---------------------
  TODO
---------------------
  * SCEP support



---------------------
  TROUBLESHOOTING
---------------------

1) Look at the error log for detailed information:
  $ tail -n 40 /var/log/syslog

2) Check the date/time of the device. A common problem is a certificate date/time valid range issue. 
Make sure your server date is within the CA, and Server certificate valid date.



----------------
  METHODOLOGY
----------------