SwissSign-specific sections in MPKI
Sections on this page:
Information on ordering and the modalities for setting up a SwissSign MPKI is available at www.swisssign.com/managed-pki/managed-pki-service.html.
The website for the administration of certificates by SwissSign can be reached under https://swisssign.net. The registration on this site is realised with the respective account data or the current operator certificate (see also Certificate). Here, a new operator certificate can be obtained once the old one has expired.
Especially in the case of managed service providers (MSPs), differences in obtaining certificates are to be taken into account: •WITHOUT organisation entry •WITH organisation entry or higher |
At this point, the connection to the SwissSign CA is configured for the automated acquisition of user certificates.
Depending on the contract, the necessary settings have to be made here. As a rule, these are provided by SwissSign via a "Welcome Email".
The SwissSign MPKI access must be converted to the new access by the end of May 2023 at the latest. To this end, all certificate managers were already informed by SwissSign in February 2023. An update to version 12.2.18 of SEPPmail Secure E-Mail Gateway is required for the conversion! The following descriptions already refer to firmware version 12.1.18 and the new SwissSign MPKI access. If required, further information can also be found in the FAQ entry SwissSign - Changeover to New CA (May 2023).
|
Parameters |
Description |
|||||
---|---|---|---|---|---|---|
Specifies the URL that is to be accessed via the MPKI. This is specified by SwissSign and is usually (changed in 12.1.18) |
||||||
This part appears in the certificate of the respective user in addition to the email address "E" as an extension of the field "Applicant". Depending on the certificate type selected, the value to be entered here is given statically by SwissSign (changed in 12.1.18) ➢SwissSign Silver ID Certificates ➢SwissSign Personal S/MIME E-Mail ID Silver and/or, for the attribute "OU=", configurable by the customer. Additionally, as CN, the display name "Name" (see Users) is displayed.
➢SwissSign Gold ID Certificates ➢SwissSign Pro S/MIME E-Mail ID Gold E = [email address]
|
||||||
|
By default, this option is inactive. With an individual configuration by SwissSign, it can be the case that parameters which have already been statically provided by SwissSign are provided in the Static subject part when trying to obtain a certificate. Usually, this results in the following error message when obtaining the certificate: Unconsumed SDN (i.e.: SDN attributes not needed and not utilised; please remove them and resubmit your request): o=... By activating this option, the obsolete parameters provided during the obtainment are ignored and, instead, the static inputs provided by SwissSign are used. Thus, the certificate can still be obtained without any problems.
|
|||||
Indication of the user name. This is usually (changed in 12.1.18) •existing customers before April 2023 <company_shortcut>.ra •new customers since April 2023 MPKI<7-digit number> - <organisation name> and will be communicated by SwissSign. |
||||||
Indication of the booked product. (changed in 12.1.18) This is usually <company_shortcut>-product_type for example: <company_shortcut>-perso-silver-emailonly <company_shortcut>-perso-gold <company_shortcut>-perso-gold-auth <company_shortcut>-perso-gold-rsassapss Possible products are ➢SwissSign Personal S/MIME E-Mail ID Silver ➢SwissSign Pro S/MIME E-Mail ID Gold Depending on the product booked, the corresponding name will also be provided by SwissSign. |
Section Domain specific parameters (optional)
If the SEPPmail Secure E-Mail Gateway manages several email domains (Managed domains), this option can be used to define specific parameters for creating user certificates for each domain.
For this to work, the accounts must be linked at SwissSign. Either directly when applying or subsequently by sending a case to mpki@swisssign.com, so that with an AUTO-RAO certificate the assignment to the other accounts is also made. |
After saving the domain specific option via Save entries, another input field appears in each case.
Parameters |
Description |
|||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Specifies the email domains for which the following two parameters should be valid. Only domains which were also named when the application was submitted to the certification body, or which were later validated separately, may be entered.
|
||||||||||||||
(new in 12.1.7) |
Specification of the product Default parameters, which may differ from the Account name. This is provided by SwissSign with the access data. |
|||||||||||||
Specification of the product Default parameters, which may differ from the Product name. This is provided by SwissSign with the access data.
|
||||||||||||||
See section Default parameters Static subject part
|
Used for authentication vis-à-vis the certification authority provider (SwissSign).
Parameters |
Description |
||
---|---|---|---|
Certificate for authentication vis-à-vis the certification authority (SwissSign). This file is provided by SwissSign and is provided with a password (see parameter PKCS12 password). If the access to the certification authority is successful, the following message appears at this point: an operator certificate with valid password has been found.
|
|||
Password to activate the - contained in the PKCS12 identity file - "private keys". This is also provided by SwissSign. |
Settings for the automatic renewal of certificates.
The validity period of the certificates of the individual users can be found in the file user-stats.csv which comes with the Daily Report (see also Groups statisticsadmin). This is especially helpful if no automatic renewal of certificates has been set. |
Parameters |
Description |
|||
---|---|---|---|---|
Automatically renew expiring certificates if validity days left less than |
This option is inactive by default and pre-set to 30. Initiates the automatic renewal of certificates of active users (Users) if the remaining validity period is the set value. One pre-condition in this respect is that the corresponding user sends an email within the set overlap time. This prevents certificates from being obtained for "corpses" in the Users menu, including certificates subject to a fee, if applicable. The thus initiated process runs overnight (!).
|
|||
Automatically create certificates for active users without certificates |
By default, this option is inactive. This function obtains a certificate for all existing active Users, who are not in possession of a valid (!) certificate, automatically overnight (!).
Active Users are users who have sent an email in the last 30 days and do not have the State inactive.
|
|||
By clicking on Add or update..., the intermediate certificates under X.509 Root Certificates required for supplementing the certificate chain when signing are added/updated.
|
The changes made are saved via the Save button.