HP-UX AAA Server A.08.01 administrator's guide (T1428-90072, May 2010)

Table Of Contents
2. Copy/etc/opt/aaa/security/demouser.p12 to user the certificate storage
on the supplicant:
the pass phrase for demouser.p12 is: 1234
the user name fordemouser.p12 is: demouser@eap.realm
3. Configure a TLS realm for eap.realm on the AAA server
Installing Your Own Digital Certificates and Keys
You can use your own certificates if your organization has a PKI and you don’t want
to use the self-signed certificates included with the HP-UX AAA Server. Refer to the
supplicant documentation to determine each supplicant’s specific certificate
requirements.
NOTE: HP recommends using the self-signed certificates included with the HP-UX
AAA Server to simulate your certificate administration before deploying your own
personal certificates in a production environment.
The HP-UX AAA Server has the following digital certificate requirements:
all certificate files stored on the HP-UX AAA Server must be in .pem or .cer
format
the servers certificate must be generated with a key file that is not encrypted with
a pass-phrase
For TLS only, the Common Name (CN) on the client certificate will be used to as
the user name and therefore must be less than 128 characters ASCII characters and
cannot include the < > ( ) [ ] \ / . , ; : or space characters.
NOTE: Refer to the supplicant documentation to determine each supplicant’s specific
certificate requirements. For example, some supplicants require the client and server
certificate to have the Enhanced Key Usage (EKU) field. For the client certificate, the
Enhanced Key Usage (EKU) field must contain the Client Authentication certificate
purpose (OID "1.3.6.1.5.5.7.3.2"); and, for the server certificate, the EKU field must
contain the Server Authentication certificate purpose (OID "1.3.6.1.5.5.7.3.1").
Installing Server Certificates and Keys
Copy the server certificate and key file to the HP-UX AAA Server in the /etc/opt/
aaa/security/directory.
If you are using TLS, copy the client CA certificate to the /etc/opt/aaa/
security/directory. You can combine multiple CA files into one file.
For TLS users whose certificates have been revoked, copy or append their
certificates to the Certificate Revocation List (CRL) file.
166 Securing LAN Access With EAP