< All Topics
Print

NIPR NCVI v4.0.0

Maintenance Guide

for COMPOSE v4.0.0

Document Version 1.01

March 2016

DISTRIBUTION STATEMENT D:  Distribution authorized to the Department of Defense and U.S. DoD contractors only; Software Documentation, 17 April 2012.  Other requests shall be referred to PMW 160, PEO C4I.

DESTRUCTION NOTICE:  For UNCLASSIFIED, limited distribution of documents, destroy by any method that will prevent disclosure of contents or reconstruction of the document.

This Page Intentionally Left Blank

Record of Changes

Change
Number
DateDocument
Version
Description of Change
 3/29/20161.01Updated email address for Pacific Region LRA/RA
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    

Documentation Conventions

Document ItemConventionExample
Screen elements (buttons, menu options, system options, fields, tabs, window names, screen names, dialog boxes, radio buttons, and checkboxes)BoldWhen you are done, click OK.
ApplicationsBoldOpen Internet Explorer.
Indicate sequential actionsBold, separated by arrow icons     ( ) or dash and right angle bracket ( -> )To open the dialog box, click FileStyleConfigure.
User-initiated data entryMarked by quotation marksType “Yes at the command prompt.
System ResponsesBoldface italics and marked by quotation marks.That is not a valid entry.
Names of the keys on the keyboardAll CAPS and enclosed in square brackets.Press the [ENTER] key.
File names, command-line entriesCourier New fontTo change the configuration, open c:\settings.conf in a text editor.
Variables in file names, command-line entriesCourier New font and marked with <angle brackets>To change the configuration, open <install directory\settings.conf.> Please enter the <IP address> of your computer.
NOTES, WARNINGS & CAUTIONSNotes, warnings and cautions will appear in text boxes throughout the document.


Table of Contents

SECTION                                                                                                                               PAGE

1        Introduction. 1

2        NCVI Maintenance Procedures. 3

2.1         Restore Backup Data. 3

2.2         Image the SVA Server 4

2.3         Review, Backup, Archive and Delete the SVA Logs. 5

2.4         Backing Up, Archiving and Deleting Historical Audit Records. 5

2.5         Copy the Backup of VA, CRL and Configuration Files to CDROM… 5

2.6         Remove Old Log and Configuration files. 6

2.7         Install New DoD CA Certificates. 6

2.8         Renewing SVA Administration Server SSL Certificate. 7

2.9         Generate an SSL Certificate Request for the VA Admin Server 7

2.10       Remove the Passphrase from the Admin Server SSL Private Key. 10

2.11       Submit Certificate Request 11

2.12       Retrieve and Install Certificates. 13

2.13       Renew SVA OCSP Signing Certificate. 15

2.14       Renew the SVA OCSP Signing Certificate. 15

2.15       Update DV Enterprise Clients with New SVA OCSP Signing Certificate. 17

2.16       Update DV Standard Clients with New SVA OCSP Signing Certificate. 19

2.17       Update Tumbleweed DV Standard Group Policy Settings. 20

2.18       Renew NOC MVA Certificate. 22

2.19       Flush SVA CRL/OCSP Database SOP. 24

2.20       Background. 24

2.21       CRL/OCSP Database Flush. 24

2.22       Manual CRL Import Procedures. 26

2.23       Download CRLs to the SVA.. 27

2.24       Configuring the SVA Server for Manual CRL Imports. 27

2.25       Verifying CRLs Published to SVA Server 28

2.26       Remove the Manual CRL Import Configuration. 29

3        Domain Controller Certificate Renewal SOP.. 31

3.1         Purpose. 31

3.2         Background. 31

3.3         Create the Required Scripts and Files for DC Certificates. 31

3.4         Copy each DCinfo… Folder to the Appropriate Domain Controller 32

3.5         Create the Certificate Request for each DC in the Domain. 33

3.6         Locate Certificate Requests for Domain Controllers. 34

3.7         Submit Certificate Requests. 34

3.8         Retrieve the DC Certificates. 37

3.9         Install the DC Certificates on the Domain Controllers. 38

3.10       Update the AD DC Store. 39

3.11       Back-up the Domain Controller Certificate. 40

4        Member Server IIS Website Certificates. 43

4.1         Introduction. 43

4.2         IIS Certificate. 43

4.2.1     Generate Certificate Request for IIS Server 43

4.2.2     Submit IIS Server Certificate Request 44

4.2.3     Retrieve COMPOSE Member Server Certificates. 46

4.2.4     Install and Replace the New COMPOSE Member Server Certificate. 47

4.2.5     Backup the COMPOSE Member Server Certificate. 49

4.3         Restore IIS Server Certificate to Web Server 50

5        SmartCard Logon Management 53

5.1         Enable SmartCard Only Logon. 53

5.2         Disable SmartCard Only Logon. 54

List of Tables

TABLE                                                                                                                                    PAGE

Table 1 – Restoring Backup Data……………………………………………………………………………………… 3

Table 2 – Copy the Backup of VA, CRL and Configuration Files to CDROM……………………….. 5

Table 3 – Removal of Old Log and Configuration Files………………………………………………………. 6

Table 4 – Installing New DoD CA Certificate(s)…………………………………………………………………. 6

Table 5 – Generate SSL Certificate Request……………………………………………………………………….. 8

Table 6 – Remove Passphrase from Admin Server SSL Private Key……………………………………. 10

Table 7 – Submit Certificate Request for SVA Administration Console from DoD CA…………. 11

Table 8 – Retrieve DoD-Issued Certificate for SVA Administration Console from DoD CA….. 13

Table 9 – Renew the SVA OCSP Signing Certificate………………………………………………………… 15

Table 10 – Update SVA Signing Certificate in DV Enterprise Clients…………………………………. 17

Table 11 – Update SVA Signing Certificate in DV Standard Client Configuration……………….. 19

Table 12 – Update DV Standard Group Policy………………………………………………………………….. 20

Table 13 – Renew the NOC MVA Certificate…………………………………………………………………… 22

Table 14 – CRL/OCSP Database Flush……………………………………………………………………………. 24

Table 15 – Download CRLs……………………………………………………………………………………………. 27

Table 16 – Import the Vpublish Dod Stand Alone.txt Configuration File……………………………… 28

Table 17 – Verify CRLs Published to SVA Server…………………………………………………………….. 28

Table 18 – Remove the Manual CRL Import Configuration……………………………………………….. 29

Table 19 – Obtain DC GUID and Create Batch Files…………………………………………………………. 31

Table 20 – Copy each DCinfo folder to Appropriate DC……………………………………………………. 32

Table 21 – Create Certificate Request for DCs………………………………………………………………….. 33

Table 22 – Gather DC Certificate Files…………………………………………………………………………….. 34

Table 23 – Submit Certificate Requests……………………………………………………………………………. 34

Table 24 – Retrieve the DC Certificates…………………………………………………………………………… 37

Table 25 – Install the DC Certificates on the Domain Controllers……………………………………….. 38

Table 26 – Update the AD DC Store……………………………………………………………………………….. 39

Table 27 – Backing up the Domain Controller Certificates…………………………………………………. 40

Table 28 – Generate Certificate Request for IIS Server……………………………………………………… 43

Table 29 – Submit Certificate Request…………………………………………………………………………….. 44

Table 30 – Retrieve DoD-Issued Certificates……………………………………………………………………. 46

Table 31 – Install and Replace IIS Server Certificate(s)……………………………………………………… 47

Table 32 – Backup/Export the IIS Web Server Certificate………………………………………………….. 49

Table 33 – Import Exported Certificate into Server’s Certificate Store………………………………… 50

Table 34 – Configure User Account(s) to Force SmartCard Logon(s)………………………………….. 53

Table 35 – Configure User Account(s) to Not Require SmartCard Logon(s)………………………… 54

This Page Intentionally Left Blank

1      Introduction

This document describes the procedures for maintaining the Navy Certificate Validation Infrastructure (NCVI) system on the Non-secure Internet Protocol Router Network (NIPRNET) shipboard network.  Procedures in this document will provide guidance in routine and non-routine maintenance procedures.

The Ship Validation Authority (SVA) Server requires periodic maintenance to ensure that it is working as designed and prevent backups/logs from filling the server hard drive space. Also over time, all digital certificates expire. The procedures in this document will provide guidance to maintain properly SVA server backups/logs and provide steps to update and replace expiring digital certificates for the various servers on the ship’s NIPR network.  As certain certificates are replaced on the network, other NCVI configurations must be updated to accept the new certificates and enable the NCVI structure to continue working properly.

This Page Intentionally Left Blank

2      NCVI Maintenance Procedures

Corrective and Preventive Maintenance of the NIPR NCVI SVA must be performed periodically. This section of the document provides various procedures required to maintain the NIPR NCVI SVA system.

  • Restore Backup Data
  • Image the SVA Server
  • Review and Archive the SVA Admin Server audit logs
  • Install new Department of Defense (DoD) Certificate Authority (CA) certificates
  • Renew the SVA Server Administration SSL Certificate
  • SVA Certificate Revocation List (CRL) / Online Certificate Status Protocol (OCSP) Database Flush

2.1        Restore Backup Data

A System Administrator can restore all the SVA configuration data or individual configurations. Restoration of all data can be done manually. This procedure would be followed if there were problems with the SVA server and it was reloaded.  This would return the SVA server back to a previously working condition.  A System Administrator can restore:

  • Certificates
  • Private keys
  • VA configuration
  • Apache configuration
  • Revocation data

Table 1 – Restoring Backup Data

STEPDESCRIPTION
 Log onto the SVA Server as a domain administrator.
 Click StartAdministrative ToolsServices.
 At the UAC prompt, click the Continue button.
 Scroll down and highlight the Tumbleweed VA Admin service.
 Right-click the Tumbleweed VA Admin service and select Stop.
 Repeat steps 4 and 5 for the Tumbleweed Validation Authority service.
 Open Windows Explorer and navigate to the folder where the SVA backups are stored for the Apache service.   e.g., E:\Program Files\Tumbleweed\VA\ServerBackups\<date/time stamped folder>\apache\conf\   Note!  The date/time stamped folder is a folder that contains a good backup of the SVA files.  If restoring after a major software failure, restore a copy from a date/time stamped folder from a time where the SVA was operating properly and there were no issues.
 Right-click the httpd.conf file and select Copy.
 Navigate to the E:\Program Files\Tumbleweed\VA\Apache\conf\ folder.
 In the white space of the folder, right-click and select Paste.
 Select Copy and Replace when prompted “There is already a file with the same name in this location.
 Navigate to the same date/time stamped backup folder as before, but go to the entserv sub-folder instead (e.g., E:\Program Files\Tumbleweed\VA\Server\Backups\<Date/Time stamped folder>\entserv\)
 Highlight and copy all of the folder contents at this location and Paste to the E:\Program Files\Tumbleweed\VA\entserv\ folder.
 When prompted “There is already a file with the same name in this location,” select the Do this for the <##> conflicts checkbox and then click on Copy and Replace.
 When prompted “This destination already contains a folder named ‘crls’ (or possibly another folder name),” select the Do this for all current items checkbox and click the Yes button.
 Close all Explorer windows and go back to the Services console window.
 Go back to the Services console, scroll down and highlight the Tumbleweed VA Admin service.
 Right-click the Tumbleweed VA Admin service and click the Start button.
 Repeat step 18 for the Tumbleweed Validation Authority service.

2.2        Image the SVA Server

Imaging the SVA server is the process of making a full backup (or complete image) of the server which will allow for the restoration of the server from a certain point in time. This image can be applied to the SVA server and return it to normal condition in one “restore” operation. Upon restart of the SVA server, the only updates that should be needed are CRL Deltas from the NOC MVA server, antivirus updates, and system updates that have occurred since the SVA server was backed-up/imaged.

  1. Create an image of the server every time any server software is upgraded, or any configuration value is changed.
  2. Create an image periodically (suggest once every three months).  
NOTEThe SVA Server downloads CRLs twice a day.  Having a backup/image that is not too old will help with returning the SVA to full operation faster if a casualty to the SVA were to occur.
  1. Use the current imaging capabilities available at your site to perform the image capture of your VA server (e.g., Acronis, Symantec, etc.).
  2. Always keep an image of the VA, stored in a fire rated container not co-located with the site.
  3. Keep the backup for three (3) years, stored in a fire rated container not co-located with the site.

2.3        Review, Backup, Archive and Delete the SVA Logs

Audit trails should be reviewed regularly for inappropriate or unusual activity.  Logs from the following directories need to be reviewed, archived, and deleted.

Archive and deletion of the on-line historical audit records must be performed periodically in order to keep the disk from reaching its capacity.  The frequency of archive and deletion is dependent on the OCSP traffic on the network.

2.4        Backing Up, Archiving and Deleting Historical Audit Records

In compliance with the NCVI CPS the following are requirements for Audit Records:

  1. Backup all records older than 90 days.
  2. Verify the records were successfully copied to your archive media.
  3. Delete from your SVA system the records that were successfully archived.
  4. Keep the archived records for three (3) years, stored in a fire rated container not co-located with the site. The sites may also delete CRLs older than 5 days.

2.5        Copy the Backup of VA, CRL and Configuration Files to CDROM

Perform the following procedure, as per the site’s routine backup schedule:

Table 2 – Copy the Backup of VA, CRL and Configuration Files to CDROM

STEPDESCRIPTION
 Log in to the SVA Server as domain administrator.
 The Backup Configuration places VA config, VA Log and CRL files in the E:\Program Files\Tumbleweed\VA\ServerBackup\<DATE/TIME>\ folders.   The CRLs were backed up into these directories and can be deleted to reduce the size of the folder prior to copying log and configuration files to CDROM.   Open each of the backup subdirectories and go to the ..\ServerBackups\<DATE/TIME>\entserv\ sub-folders.  The configuration files are located here as well as a crls sub-folder. Delete the crls sub-folder only from these backups.
 Create a folder named Backups off the root of the E: drive (if not already present).   Create a sub-folder under the E:\Backups\ folder, with the server name and date (e.g., ShipVA_25Jun15).
 Copy the following folders/files into the backup folder:   E:\Program Files\Tumbleweed\VA\ServerBackups\* (copy last 2 weeks, or any other folders that were not previously backed up and removed.)
 Navigate to the E:\Backups\ folder, right-click on the date stamped current backup (e.g., E:\Backups\ShipVA_25Jun10\) folder, select Send To and then Compressed (zipped) Folder.
 Copy the compressed folder to a workstation that has CD Burning software (e.g., Easy CD Creator) and burn this backup to a DVD.
 Remove the old files from the system using the procedures in the next section.

2.6        Remove Old Log and Configuration files

  1. After the DVD backups are complete, backed-up files older than 90 days should be removed from the SVA server hard drives.
  2. Verify the DVD media created in the previous section is valid and files are readable prior to deleting.

Table 3 – Removal of Old Log and Configuration Files

STEPDESCRIPTION
 If not already logged in, log onto the SVA Server as a domain administrator.
 In the E:\Backups\ folder, delete all folders older than 90 days.
 In the E:\Program Files\Tumbleweed\VA\ServerBackups\ folder, delete all sub-folders (all the backup folders should already be located in the E:\Backups folder).

2.7        Install New DoD CA Certificates

In order to receive CRLs from any new DoD CA, the SVA server must be configured with the certificate(s) of the new CA(s).  The Ship’s VA Administrator will be informed via a FAM that there is/are new DoD CA(s) that need to be installed in the Ship’s NCVI configuration.  Normally the FAM will be related to a new InstallRoot.exe that is available for download. The procedure below will download the new DoD CA(s) NOC MVA server and add to the SVA server configuration.

Table 4 – Installing New DoD CA Certificate(s)

STEPDESCRIPTION
 Log into the SVA Server as a domain administrator.
 Double-click on the Tumbleweed Validation Authority(TM)’s Administration shortcut.
 If a prompt appears stating there is a problem with this website’s security certificate click the Continue to this website (not recommended) hyperlink to continue.
 At the USG Warning and Consent Banner page, click the OK button.
 Enter a SVA administrator’s login credentials and click the Login button.
 From the CONFIGURATION menu, click on Keys and CertificatesCertificates.
 On the Manage Certificate Store page, under the Mandatory Stores section, select the CA Certificates [OCSP Protocol] radio button, scroll to the bottom of the page and click the Submit button.
 On the Configure VA Certificate Store page, in the upper right-hand corner of the page, click the Add button.
 On the Certificate Import Method page, select the VA Server radio button and click on the Submit Certificate Import Method button.
 On the Import Certificates from VA Server page, enter mva.nocv.navy.mil in the Host Name: field and 80 in the Port: field. Leave the Use SSL checkbox unchecked and click the Get VA Certificates.
 On the Select Certificatespage, ensure the Select All checkbox is checked, scroll to the bottom of the page and click Submit Certificates.   Note!  This procedure assumes the NOC MVA Server has been updated with the new certificate(s) prior to release of the FAM.
 When returned to the Configure VA Certificate Store page returns, note that the Certificate Count: in the top left-hand section of the page has gone up.
 From the CONFIGURATION menu, click Start/Stop Server menu option.   At the Server Start/Stoppage, click the Restart Server button.

2.8        Renewing SVA Administration Server SSL Certificate

The SVA Administration server certificate will need to be renewed once every three years since server certificates are only good for a period of three years.  Prior to the certificate expiring, the SVA server should send notices to the VA Administrators distribution group notifying that the certificate will expire soon.  The certificate renewal process should be started 60 days prior to the expiration of the current certificate.

NOTEIn this procedure, the process of obtaining a DoD Server certificate, as per the steps below, may take 1 or more days to complete.

2.9        Generate an SSL Certificate Request for the VA Admin Server

Perform the steps below to generate the certificate keys and request file for the VA Administration Server SSL certificate:

Table 5 – Generate SSL Certificate Request

STEPDESCRIPTION
 Log on to the SVA server as a domain administrator.
 Double-click on the Tumbleweed Validation Authority ™’s Administration shortcut.   Note! If a prompt appears stating there is a problem with this website’s security certificate click the Continue to this website (not recommended) hyperlink to continue.
 At the USG Warning and Consent Banner page, click the OK button.
 Enter a SVA administrator’s login credentials and click the Login button.
 From the CONFIGURATION menu, select Keys and Certificates and Create/Import Private Key.
 On the Key Type Selectionpage, under the Mandatory section, select the SSL Communication For Admin Server radio button and click the Submit Key Type button.
 On the Key Generation/Import Mechanism: SSL Communication For Admin Server page, select the Generate/Import Software Key radio button and click the Submit Key Generation Technique button.
 On the second Key Generation/Import Mechanism: SSL Communication For Admin Server page, select the Generate new private key radio button and click the Submit Key Generation Or Import button.
 On the Generate Software Key and Certificate: SSL Communication For Admin Server page, enter the following:   Private Key Parameters *Server Password:   (Password will be grayed out). *Friendly Key Name:  Note! Enter a name for this key. Each time a certificate key is generated, it will need a unique Friendly Key Name.  e.g., Admin_SSL4March 2015 *Key Expiration in days:  ‘0*Key Algorithm:  RSA *Key Length:  2048 *Hash Algorithm:  SHA1   Certificate Request Information *Type:  Certificate Request Ensure the Simple DN Entry: radio button is selected. Country:  United States of America State and City fields:  blank Organization:  U.S. Government Department:  DoD,OU=PKI,OU=USN *Common Name:  Shipva.<Domain FQDN> e.g., shipva.cvn65.navy.mil Email Address:   va_administrators@cvn65.navy.mil   Certificate Request Options Leave the password fields blank.   Scroll to the bottom of the page and click the Submit button.    
 A SUCCESS! page will display. If you want to view the certificate information, click on the Click here to view certificate information link on the page.   Note!  The certificate request will be saved as a file under the E:\Program Files\Tumbleweed\VA\entserv\.ckbak folder and named SSL_COMM_<Date/Time stamp>.req.   Note!  To make the certificate request process a little easier, save a copy of the certificate request file in a shared network location that can be accessed later.
 If the SUCCESS! page does not display, but instead Operation Failed.  Please check the admin logs for detailed information error is displayed, proceed with the following:   Click the Back button on the browser to go back to the Generate Software Key and Certificate: SSL Communication for Admin Server page.For the Friendly Key Name enter a new name (different from the previous attempt).  Ensure all other information is still entered correctly and select Submit.

2.10    Remove the Passphrase from the Admin Server SSL Private Key

Perform the following steps to remove the passphrase from the private key generated in the previous section.  By removing the private key passphrase the Admin Server will start without requiring the user to enter the passphrase.

Table 6 – Remove Passphrase from Admin Server SSL Private Key

STEPDESCRIPTION
 Create a backup copy of the adminserver.key file. Navigate to the E:\Program Files\Tumbleweed\VA\entserv\ folder.Right-click adminserver.key and select Copy.Right-click in the white area of the Explorer window and select Paste.Right-click on the new file adminserver – copy.key and select Rename.  Rename the file to adminserver.key.bak.
 Remove the passphrase. Click Start and then Command Prompt.Change directories to the E:\Program Files\Tumbleweed\VA\entserv\ folder.  E:   [ENTER] cd \Program Files\Tumbleweed\VA\entserv\  [ENTER] Remove the passphrase. ..\tools\openssl rsa –in adminserver.key –out adminserver.key [ENTER] Note!  A warning may appear that states: “WARNING: can’t open config file: /usr/local/ssl/openssl.cnf.” This message may be safely ignored. Enter the password when prompted.
 Verify the passphrase has been removed. Click Start Administrative ToolsServices.At the UAC prompt, click the Continue button.Scroll down in the list of services and locate the Tumbleweed VA Admin service.Right-click the Tumbleweed VA Admin service and select Restart.If the service restarts without requiring a password to be entered, then the passphrase has been removed.If prompted to enter a password, repeat step 2 (above) to remove the passphrase.

2.11    Submit Certificate Request

The next step in requesting a DoD issued certificate for the SVA server, is to submit a certificate request to a DoD CA server.

Table 7 – Submit Certificate Request for SVA Administration Console from DoD CA

STEPDESCRIPTION
 Log on to a domain workstation as a domain user.
 To determine the DoD Certification Authority (CA) server that will be used to obtain a new Server Certificate, open Internet Explorer and browse to https://infosec.navy.mil/PKI/server.jsp.
 Infosec’s web site will list the DoD CAs that are available to request new certificates. Click on the hyperlink for one of the listed DoD CA URLs provided on the Infosec webpage.
 If a prompt appears indicating that there is a problem with the website’s security certificate, click Continue to this website (not recommended).
 At the DoD Warning prompt, click OK.
 For the selected DoD CA website, the Certificate Profile page will display. 
 Ensure the Enrollment tab is selected. Click on Regular 2048-bit SSL Server Enrollment.If a Web Access Confirmation prompt is displayed, click Yes. The Certificate Profile page for the specific enrollment displays.   Open the VA server certificate request using Notepad. In the Notepad File menu, select FormatWord Wrap. Note!  Keep the Server Certificate Enrollment window displayed in the browser.  Copy the certificate information from Notepad into this browser screen. In Notepad, highlight all of the text for the certificate, including the “——BEGIN CERTIFICATE REQUEST——“ header and the “——END CERTIFICATE REQUEST——“ trailer, including all the dashes.Right-click the highlighted text and select Copy. Click on the Internet Explorer Certificate Profile browser window to make it active.For the =Certificate Request Type field, ensure PKCS #10 is selected.In the Certificate Request text box, right-click and select Paste. Note!  This will paste the contents of the certificate request file. Complete the following informational fields: Requestor Name:  <Name>Requestor Email:  <Email>Requestor Phone:  <Phone>Once all fields are filled in on the webpage, click Submit.The Request Successfully Submitted web page appears.  This page will provide the Request ID # for the certificate. Print, or by other means, document the Request ID #.  
 Work with the local Information Assurance Manager (IAM) or Information Assurance Officer (IAO) to send a digitally signed email to the Registration Authority (RA), providing notification that the certificate requests are ready for review and approval. 
 The NAVAL COMMUNICATIONS SECURITY MATERIAL SYSTEM (NCMS) provides Registration Authority support for all server (SSL) certificates.   Atlantic region installs: Merkeshia McKnight (RA) (240)857-9865; Alesia Blake(RA) (240)857-9735; NCMS_NAFW_NAVY_PKI@navy.mil   Pacific region installs: Michelle Hughes(RA) (808)472-0388; NCMS_NAFW.PKI_HI@navy.mil   The following must be included in the digitally signed email: Reference Number from CA: <Request ID#>   Note! The Request ID # from CA-XX was obtained in step 7 where XX is the number of the DoD CA URL used for the certificate requests.   Host Name:  <Servers Hostname>IP Address:  <Servers IP Address>Region:  <Location>Base:  <Base Name>Network System Administrator (NSA):  < Name of Administrator>System Owner:  SPAWARSecurity Level:  UNCLASSApplications on Server:  <Description of Apps on Server> (e.g., Domain Controller, Sharepoint Web Server, etc.) Note!  If the requestor does not receive anything from LRA/RA within one – two days after the initial email has been sent, resend email or contact the LRA/RA by phone.  Have the Request ID # ready for reference. 

2.12    Retrieve and Install Certificates

Once an email has been received stating the certificates are approved and are ready for retrieval, use Internet Explorer and browse to the issuing DoD CA site where the request was originally submitted.

Table 8 – Retrieve DoD-Issued Certificate for SVA Administration Console from DoD CA

STEPDESCRIPTION
 Log into a domain workstation as a domain user.
 Using Internet Explorer, navigate to the URL which was used to request the server certificate.   Note!  If the link to the DoD CA that was used to request the certificates is unknown, the below URLs can assist in determining the correct URL to retrieve the approved certificates:   https://infosec.navy.mil/PKI/server.jsp
 If a prompt appears indicating that there is a problem with the website’s security certificate, click Continue to this website (not recommended).
 At the DoD Warning prompt, click OK.
 When the Certificate Profile page displays, click the Retrieval tab.
 On the Check Request Status page, in the Request identifier: field, enter the request ID that was previously recorded and click Submit.
 Highlight the text under Base 64 encoded certificate including the ——BEGIN CERTIFICATE—— header and the ——END CERTIFICATE—— trailer with all the dashes.   Note!  Do NOT use the section that includes the CA certificate chain.   Click on the blue underlined text to the right of Issued certificate:   Note!  The blue underlined text is the serial number of the certificate.   Once the Certificate page displays, showing the Certificate contents, scroll down to the Installing this certificate in a server section.   Right-click the highlighted text and select Copy.
 Open Notepad. Paste the text copied from the webpage into the Notepad window.  Click File and then Save As. Navigate to a network location that can be accessed from the SVA server.Name the file adminserver.crtClick Save.
 Log off the domain workstation and log back on as a domain administrator.
 Open a Windows Explorer window and navigate to the SVA’s E: drive \Program Files\Tumbleweed\VA\entserv\ folder.   \\shipva\e$\Program Files\Tumbleweed\VA\entserv\   Note!  If a file named adminserver.crt is already present, rename to adminserver.crt.bak.
 Right-click in the white area of the Windows Explorer window and select Paste.
 Open the Tumbleweed VA Authority Server Administrative console from an Internet Explorer browser window.   https://shipva:13333/cgi-bin/forms.exe
 At the USG Warning and Consent Banner page, click the OK button.
 At the logon prompt, enter the appropriate credentials.   Note!  If the SVA Administration web page doesn’t display, it may be necessary to restart both Tumbleweed services. Open the Services mmc and restart both Tumbleweed VA Server services.
 On the Welcome to Tumbleweed Validation Authority 4.11.xpage, under the Configuration menu, click on Keys and Certificates and Certificates.
 On the Manage Certificate Store page, under the Mandatory Stores section, select the SSL Communication For Admin Server radio button, scroll down to the bottom of the page and click Submit.
 On the Configure VA Certificate Store page, in the upper right-hand corner, click on the Add button.
 On the Certificate Import Method page, select the Local File radio button and click on Submit Certificate Import Method.
 On the Import Certificate File page, click on the Browse button and manually type in:  \\<SVA server>\E$\Program Files\Tumbleweed\VA\entserv\ to navigate to that location on the SVA server and select the adminserver.crt file and click the Open button.
 On the Import Certificate File page, click the Submit Certificate File.
 On the Select Certificates page, ensure the Select All checkbox is selected and click Submit Certificates.   The new certificate will be listed in the Table on the Configure VA Certificate Store page.
 If the self-signed shipva certificate is listed, select the checkbox to the left of the self-signed certificate line and click the Delete button above.   You should now see only the new DoD issued certificate for the shipva listed.
 Log off the domain workstation.
Restart the Tumbleweed VA services:
 Log onto the SVA Server as a domain administrator.
 Click StartAdministrative ToolsServices.
 Scroll down and highlight the Tumbleweed Validation Authority service.
 Right-click the Tumbleweed Validation Authority service and select Stop.
 Right-click the Tumbleweed VA Admin service and select Restart.
 Right-click the Tumbleweed Validation Authority service and select Start.
 Close the Services console and log off the SVA server.

2.13    Renew SVA OCSP Signing Certificate

The following procedures detail how to renew the VA’s signing certificate. This will have to be done once every three years. The SVA’s OCSP signing certificate expires every three years and must be renewed for NCVI to continue working properly.  Once the SVA OCSP signing certificate expires, there will be no ability to verify DoD related certificates until a new SVA OCSP signing certificate is created.  Along with the creation and installation of the new SVA OCSP signing certificate, DV Standard and Enterprise configurations must be updated with the new certificate.

2.14    Renew the SVA OCSP Signing Certificate

The procedures below provide guidance on creating a new SVA OCSP Signing Certificate.

Table 9 – Renew the SVA OCSP Signing Certificate

STEPDESCRIPTION
 Log on the SVA Server as a domain administrator.
 Double-click on the Tumbleweed Validation Authority (TM)’s Administration shortcut from the desktop.
 If a prompt appears stating there is a problem with this website’s security certificate, click the Continue to this website (not recommended) hyperlink to continue.
 At the USG Warning and Consent Banner page, click the OK button.
 Enter the Administrative Login credentials and click the Login button.
 From the CONFIGURATION menu, select Keys and CertificatesCreate/Import Private Key.
 On the Key Type Selection page, under the Mandatory section, select the Default OCSP Response Signing radio button and click the Submit Key Type button.
 On the Key Generation/Import Mechanism: Default OCSP Response Signing page, select the Generate/Import Software Key radio button and click the Submit Key Generation Technique button.
 On the second Key Generation/Import Mechanism: Default OCSP Response Signing page, select the Generate new private key radio button and click Submit Key Generation or Import button.
 On the Generate Software Key and Certificate: Default OCSP Response Signingpage, enter the following information:   Private Key Parameters: *Server Password:   (This field will be grayed out & unable to be changed.) *Friendly Key Name: (Enter a name for this key. Each time a certificate key is generated, it will need a unique Friendly Key Name.)  e.g., OCSP27March2015 *Key Expiration in days (Enter 0 for never expiring keys): 0 *Key Algorithm: RSA *Key Length: 2048 *Hash Algorithm: SHA1   Certificate Information: *Type: Select “Self-signed Certificate” *Certificate Validity (days): 1096 Ensure the Simple DN Entry: radio button is selected. Country: select United States of America For State and City, leave blank. Organization: U.S. Government Department: DoD, ou=PKI, ou=USN Common Name: shipva Email Address: VA_Administrators@<FQDN of Domain>   Scroll to the bottom of the page and click the Submit button to continue.
 A Success! page will display stating Self signed certificate for Default OCSP/SCVP Response Signing was created successfully.
 Remove the old SVA Signing certificate. Under the CONFIGURATION menu, click Keys and CertificatesCertificates. On the Manage Certificate Store page under Mandatory Stores, ensure the Default OCSP/SCVP Response Signing radio button is selected. Scroll to the bottom of the page and click Submit. On the Configure VA Certificate Store page, two shipva certificates will be shown. Select the old shipva certificate checkbox and click the Delete button at the top left side of the page.
 Restart the SVA server.   Under the CONFIGURATION menu, click the Start/Stop Server menu option.” On the Server Start/Stop page, click Stop Server Start Server.   Note!  Clicking Restart Server will accomplish the same action.
 Update of the SVA OCSP Signing certificate is complete.

2.15    Update DV Enterprise Clients with New SVA OCSP Signing Certificate

After updating the SVA OCSP signing certificate, ALL DV clients will need to have the new SVA OCSP signing certificate added to their configurations. If this step is not done, DV Standard and Enterprise client OCSP certificate requests will stop working and the DV Enterprise clients will be unable to download VACRLs.

Table 10 – Update SVA Signing Certificate in DV Enterprise Clients

STEPDESCRIPTION
 Log into DC0001 as a domain administrator.
 Note! If upon opening the Axway Desktop Validator configuration page, the options are grayed out and none can be changed, exit out from the Axway Desktop Validator console. Right-click the Axway Desktop Validator icon in the System Tray and select Close. At the You will no longer receive alert messages for Certificate Revocation Checking on you system … prompt, click the Yes button.  Right-click the Axway Desktop Validator shortcut on the desktop and select Run as administrator. At the UAC prompt, click Allow.
 Right-click the Axway Desktop Validator icon in the System Tray and select Properties.
 With the General tab selected, under the CA Specific Validation Options section, click the Settings… button.
 Ensure the Show Only Configured CAs checkbox is selected.
 Highlight the first certificate in the listing, scroll to the bottom of the listing, hold the [Shift] key down and select the last certificate in the certificate listing (All CA certificates should now be highlighted).
 Click the Set Validation Options button.
 On the CA Specific Validation Options page, under the Validation Options section, highlight the shipva.<FQDN of Domain> line that shows OCSP as the protocol and click the Edit button.
 On the Validation Optionspage, click the AutoConfig next to the Address: text box.
 When prompted that Autoconfiguration was successful, click the OK button twice.
 Repeat steps 8 through 10, this time selecting the shipva.<FQDN of Domain> line that shows VACRL as the protocol.
 When returned to the CA Specific Validation Options page, click the OK button twice.
 When returned to the General tab, click the Apply OK buttons.
 The DV configuration console will close and the service will show as restarting.
 Right-click the Axway Desktop Validator shortcut on the desktop and select Properties.
 Select the Import/Export tab.
 Ensure the Share Configuration and Text Format radio buttons are selected.
 In the Configuration File Pathname section, click the Browse… button.
 Navigate to the E:\compose\incl\ocsp\ folder. In the File name: text box, enter DVEnterprise_<date/time stamp>.   e.g., DVEnterprise_30JAN16 Ensure the Files of type: text box shows Text Files (*.txt).  Click the Open button.
 When returned to the Import / Export tab, click the Export button.
 Click the OK button when prompted that the Desktop Validator configuration exported successfully.
 Close the Tumbleweed Desktop Validator client window.
 Log off DC0001.
 From the remaining domain controller and member servers that have Tumbleweed Desktop Validator Enterprise client installed, follow the procedures below. Log into the Domain Controller / Member server as a domain administrator.Repeat step 2 above if the configuration can’t be modified.Right-click on the Axway Desktop Validator icon in the system tray.Select the Import/Export tab.Ensure the Share Configuration and Text Format radio buttons are selected.In the Configuration File Pathname section, click the Browse… button.Navigate to the \\<Domain_Controller_1>\compose\incl\ocsp\ folder, select the latest saved Tumbleweed Desktop Validator Enterprise configuration file and click the Open button.When returned to the Import / Export page, click the Import button.Log off the server.Repeat for remaining servers.

2.16    Update DV Standard Clients with New SVA OCSP Signing Certificate

After updating the SVA OCSP signing certificate, ALL Tumbleweed DV Standard clients will need to import the new signing certificate. If this step is not done, OCSP CRL responses will stop working for the Tumbleweed DV Standard clients.

Table 11 – Update SVA Signing Certificate in DV Standard Client Configuration

STEPDESCRIPTION
 Log into a workstation as a domain administrator.   Note!  Use a workstation that doesn’t have any issues with its Tumbleweed DV Client configuration.
 Note! If upon opening the Axway Desktop Validator configuration page, the options are grayed out and none can be changed, exit out from the Axway Desktop Validator console. Right-click the Axway Desktop Validator icon in the System Tray and select Close. At the You will no longer receive alert messages for Certificate Revocation Checking on you system … prompt, click the Yes button.  Right-click the Axway Desktop Validator shortcut on the desktop and select Run as administrator. At the UAC prompt, click Allow.
 Update the Axway DV Configuration for workstations by right-clicking the Axway Desktop Validator icon in the System Tray and select Properties.   Note!  If the desktop shortcut is not present, click StartAll Programs TumbleweedDesktop ValidatorTumbleweed Desktop Validator System Tray Utility. This will start the Tumbleweed Desktop Validator and place an icon in the System Tray. Double-click the Tumbleweed Desktop Validator icon in the System Tray.
 Ensure the General tab is selected.
 Under the CA Specific Validation Options section, click the Settings button.
 Ensure the Show Only Configured CAs checkbox is selected. Highlight the first certificate in the listing, scroll to the bottom of the listing, hold the [Shift] key down and select the last certificate in the certificate listing.   Note! The certificates highlighted should only be the DoD/ECA Root certificates.
 Click the Set Validation Options button.
 On the CA Specific Validation Options page, under the Validation Options section, highlight the shipva.<FQDN of Domain> line that shows OCSP as the protocol and click the Edit button.
 On the Validation Options page, click the AutoConfig button next to the shipva’s Address: text box.
 When prompted that Autoconfiguration was successful, click the OK button.
 Click the OK three times.
 When returned to the General tab, click the Apply OK buttons.
 Double-click on the Tumbleweed Desktop Validator shortcut on the desktop.
 Select the Import / Export tab.
 Ensure the Share Configuration and Text Format radio buttons are selected.
 Under the Configuration File Pathname section, click the Browse… button.
 Using Windows Explorer, navigate to the \\<DC0001>\COMPOSE\Incl\OCSP\ folder and select the current DVStandard.txt file and click the Open button.
 When returned to the Import / Export page, click the Export button.
 When prompted that Desktop Validator configuration exported successfully, click the OK button.
 Click the OK button to close Tumbleweed DV Standard Configuration console.
 Log off the workstation.

2.17    Update Tumbleweed DV Standard Group Policy Settings

The actual Tumbleweed DV Client settings are distributed to the workstations via the DV Standard Group Policy. When the workstations require the DV Standard settings to be updated, the DV Standard Group policy is updated so it will trigger all workstations to download the latest DV Standard configuration.

Table 12 – Update DV Standard Group Policy

STEPDESCRIPTION
 Log into DC0001 as domain administrator.
 Click StartAll Programs Administrative ToolsGroup Policy Management.
 At the UAC prompt, click the Continue button.
 In the left pane of the Group Policy Management console, expand ForestDomains FQDN of the domain and select DV Standard Config Policy.
 Right-click the DV Standard Config Policy and select Edit.
 In the left pane of the Group Policy Object Editorwindow, expand Computer ConfigurationPolicy Administrative Templates Classic Administrative Templates (ADM) DESKTOP VALIDATOR and select Configuration.
 In the right pane, double-click Settings.
 On the Settings Properties page:   Update the ModificationID field to a current date/time stamp. e.g., 29Jan151530 Verify the location is the correct path for the DVStandard.txt file. e.g., \\cvn65ucsDC0001\compose\incl\ocsp\DVStandard.txt Verify the Type, RefreshPeriod and MaxRefreshSalt text fields are ‘0’.   Click the OK button to close the Settings Properties page.
 Close the Group Policy Object Editorand Group Policy Managementwindows.   Note! The domain workstation DV Standard Clients will update their settings as group policies are updated on the workstations.
 Log off DC0001.
NOTEDV Enterprise and Standard Client configurations are now updated with the new SVA OCSP signing certificate.

2.18    Renew NOC MVA Certificate

The NOC MVA certificate expires every three years. The procedures below provide guidance on downloading and installing the latest NOC MVA certificate. Normally, a FAM will be sent that will direct the SVA administrators to download and install the new NOC MVA certificate.

Table 13 – Renew the NOC MVA Certificate

STEPDESCRIPTION
 Log into the SVA server as a domain administrator.
 Double-click on the Tumbleweed Validation Authority Administration shortcut from the desktop.
 If a prompt appears stating there is a problem with this website’s security certificate, click the Continue to this website (not recommended) hyperlink to continue.
 At the USG Warning and Consent Banner page, click the OK button.
 Enter the Administrative Login credentials and click the Login button.
 From the CONFIGURATION menu, select Keys and CertificatesCertificates.
 On the Manage Certificate Store window in the right pane, under Optional Stores, select the Trusted Responder’s CRL Signing Certificates [CRL Mirroring] radio button. Scroll to the bottom of the page and click the Submit button.
 Note! On the Configure VA Certificate Store page, you will see the old NOC MVA certificate.   Click the Add button to the right side of the screen.
 On the Certificate Import Method page, select the VA Server radio button and click the Submit Certificate Import Method button.
 On the Import Certificates from VA Server page, enter the following: Host Name:      mva.nocv.navy.milPort:                 80Leave the Use SSL checkbox unchecked. Click the Get VA Certificates button.
 Note! The Ship Validation Authority (SVA) server requires connectivity to the shore side NOC MVA server. If an error is received stating, Error: Cannot get configuration data from VA, this indicates a failure of the shipboard VA server to reach the shore side NOC MVA server. Verify and correct connectivity issues preventing communications between the SVA and the NOC MVA server.   If the NOC MVA server can’t be reached, perform the steps below to manually add the NOC MVA server certificate (These procedures assume a soft copy of the MVA cert is available):   From the CONFIGURATION menu, click on Keys and Certificates and then Certificates.On the Manage Certificate Store page, under the Optional Stores section, select the Trusted Responder’s CRL Signing Certificates [CRL Mirroring] radio button. Scroll to the bottom of the page and click the Submit button.On the Configure VA Certificate Store page, click the Add button at the upper right hand corner of the frame.On the Certificate Import Method page, select the Local File radio button and then click the Submit Certificate Import Method button.On the Import Certificate File page, click the Browse… button.Using Windows Explorer, navigate to a file location that contains the new NOC MVA certificate.Select the NOC MVA.cer file and click the Open button. Note!  The actual file sent with the FAM may be named slightly different from this example.   When returned to the Import Certificate File page, click the Submit Certificate File button.
 On the Select Certificates page, locate the old NOC MVA certificate and select the checkbox in front of it. Click the Delete button at the top of the table.
 When prompted, Please confirm that you would like to delete the selected Certificate(s) by clicking OK below. Otherwise, click Cancel, click the OK button.
 On the left-hand side of the window under the CONFIGURATION menu, click the Start/Stop Server menu option.   The Server Start/Stop page displays.
 On the Server Start/Stop page click the Start Server button.   The Server Status: will now show on.
 Close the Tumbleweed VA Administration console and log off the SVA server.

2.19    Flush SVA CRL/OCSP Database SOP

This section of the document is to provide the procedures required for maintenance of the Shipboard Validation Authority (SVA) Certificate Revocation List (CRL) Database.  The recommendation is for ships to perform these procedures at least once while the ship is in port and not while at sea. These procedures should be performed after a ship returns to port, after a Shipboard Validation Authority (SVA) server is reconfigured from Manual CRL downloads to automatic CRL downloads and when the SVA administrator determines CRLs are not downloading and updating properly, and the cause is problems with the base CRLs.

2.20    Background

The SVA may occasionally experience difficulties in downloading and installing the manufactured delta CRLs that download from the NOC MVA server. In the SVA Server Logs, the administrator may see statements that roughly state “Rejecting CRL for issuer (Various Certificate Authorities information). Reason: Do not have the base for delta CRL.” This error may occur from the SVA shifting its connection from a NOC MVA server of one AOR to another. It may also occur after switching the SVA server from being configured for Manual CRL updates to automatically downloading CRL updates from the NOC MVA server.

To prevent this issue from causing future problem with SVA operability, it’s recommended for the SVA administrator(s) to flush the CRL/OCSP databases upon a ship’s return to port or after switching from manual to automatic CRL downloads. These procedures should not be performed while the ship is underway due to bandwidth considerations. A full CRL download could be 190 MB or more of data to download from the NOC MVA server.

2.21    CRL/OCSP Database Flush

The procedures below provide guidance in flushing the CRL/OCSP databases. This essentially means the databases are emptied and will start a full database download of affected CRLs the next time the SVA Server service is started.

NOTEPerform the steps in this SOP after the ship pulls in to port. These procedures only need to be performed once per in-port period and should not be performed when out-at-sea.
NOTEIn the occasion that the CRLs had to be flushed while underway, CLO and other PKI functionality may not work properly until all applicable CRLs are downloaded. On a limited bandwidth configuration, this could be a considerable amount of time.

Table 14 – CRL/OCSP Database Flush

STEPDESCRIPTION
 Log into the SVA Server as a domain administrator.
 Double-click the Tumbleweed Validation Authority Administration icon on the desktop.
 At the USG Warning and Consent Banner page, click the OK button.
 The Administrative Login window displays. Enter your credentials for the SVA server and click Login.   The Welcome to Tumbleweed Valicert Validation Authority window appears.
 On the left-hand side, under CONFIGURATION menu, click the Start/Stop Server menu option.   The Server Start/Stop window displays.
 On the Server Start/Stop window, click the Stop Server button.  The Server Status: should now show: off.
 On the left-hand side, under the CONFIGURATION menu, select CRLsCRLs & OCSP Databases.   The CRL Summary page displays.
 On the Cleanup All Crls column header cell, check the checkbox to the left of Cleanup All Crls. All Certificate Authority (CA) checkboxes will now be selected with checkmarks next to Flush CRLs.
 Scroll to the top of the CRL Summary page and click the Flush Selected Crls or OCSP DBs button.   The Confirm CRL and OCSP DB Flush Action page displays.
 On the Confirm CRL and OCSP DB Flush Action page click the Flush CRL and OCSP DB Information button.   A SUCCESS! window displays.
 On the left-hand side under the CONFIGURATION menu, click CRLsCRLs & OCSP Databases.   The CRL Summary page displays with all CAs showing CRL absent.   Note! An alternate method to verify all CRLs are flushed/removed is to use Windows Explorer and navigate to the E:\Program Files\Tumbleweed\VA\entserv\crls\ folder. This folder should be empty at this point in the procedures. If for any reason there are still files in this folder, highlight the files and delete. Never delete the crls folder itself. If the crls folder is deleted, the SVA will not restart. Only delete the files within the E:\Program Files\Tumbleweed\VA\entsrv\crls\ folder.
 Close the Explorer window and return to the Tumbleweed SVA Administration window.
 On the left-hand side under the CONFIGURATION menu, click the Start/Stop Server menu option.   The Server Start/Stop page displays.
 On the Server Start/Stop page click the Start Server button.   The Server Status: will now show on.
 On the left-hand side under the CONFIGURATION menu, click CRLs CRLs & OCSP Databases.   The CRL Summary page will display.
 As the CRLs are downloaded, the CRL absent statuses will be replaced with the date/time of the last issuance of the CA CRL and the date/time the SVA downloaded the CRL from the NOC MVA server.   Note!  Depending on the bandwidth available, it may take a while for all CA CRLs to download to the SVA server.
 To refresh the screen, on the left-hand side under the CONFIGURATION menu, click CRLs CRLs & OCSP Database.
 The CRLs will normally download in the order of the CAs listed on the CRL Summary page. After refreshing the screen, continue scrolling to the bottom of the CRL Summary page. This procedure is complete when all CA CRLs on the CRL Summary page no longer have the status of CRL absent.
 Close the Tumbleweed Validation Authority Administration window.
 Log off the SVA server.
NOTECRL Troubleshooting http://mva.nocv.navy.mil:80 URL. The page displayed should be mainly a white page with “Welcome to the Tumbleweed Validation Authority Server” at the top of the window.

2.22    Manual CRL Import Procedures

This section provides procedures for the Shipboard Validation Authority (SVA) Administrator to setup the SVA server for manual CRL imports to update the Certificate Revocation List (CRL) database when the NOC MVA server is not available. 

2.23    Download CRLs to the SVA

When connectivity to the RCVS Server is not available, CRLs can be manually downloaded to a location on the local network. Once the CRLs are downloaded, the SVA can be configured to use these local CRLs vice trying to connect to the RCVS server. If configured in this fashion, this process will need to be done at least weekly until connectivity to the RCVS server is established or restored.  To download CRLs to the SVA follow these steps:

Table 15 – Download CRLs

STEPDESCRIPTION
 Log on to the SVA server as a domain administrator.
 If not already created, on the SVA server, create the folder: E:\CRLS\.
 Open Internet Explorer and navigate to SIPR: https://crl.gds.disa.smil.mil or https://crl.chamb.disa.smil.mil   NIPR: https://crl.gds.disa.mil or https://crl.chamb.disa.mil   Note!  If the SVA server is not configured to browse offship, the same files may be downloaded to a workstation and then copied to the E:\CRLS\ folder on the SVA server.
 On the DoD Warning banner page click the OK button to continue.
 On the DoD PKI Management Welcome Screen page, in the left window pane under PLEASE SELECT ONE CA, highlight All CRL ZIP and click on the SUBMIT SELECTION button directly below.
 In the right window pane an ALL CRL ZIP Certificate Revocation List window will display. Click on the Download ZIP hyperlink.
 When prompted Do you want to open or save this file?, click the Save button. Browse to the E:\CRLs\ folder and save the file to this location.   Note!  The directory path E:\CRLS is pre-configured in the vpublish_DoD_Stand_Alone_v1.0.txt configuration file which the SVA will use to load the CRLs from.  This drive and folder must be used for the SVA to properly retrieve CRLs from files.
 Open an Explorer window and navigate to the E:\CRLS\ folder. Right-click the ALLCRLZIP.zip and extract all files to the E:\CRLS\ folder.   Note!  Ensure that the E:\CRLs\ folder only contains the extracted CRL files. The CRLs will not be updated if the extracted files are in a folder inside of the E:\CRLs folder.
 Close the Windows Explorer window and continue to the next section.

2.24    Configuring the SVA Server for Manual CRL Imports

To configure the SVA server to load the CRL data from a local folder on the SVA, the vpublish DoD Stand Alone.txt configuration file must be imported to the SVA server.  Perform the following steps to import the Vpublish DoD Stand Alone.txt configuration file.

Table 16 – Import the Vpublish Dod Stand Alone.txt Configuration File

STEPDESCRIPTION
 Double-click the Tumbleweed Valicert Validation Authority Administration icon from the desktop.   Note!  If the SVA Administration logon page does not display, you can log on to a domain workstation as a domain administrator and manage the SVA from there. From the workstation, use the URL: https://shipva.<FQDN of the Domain>:13333/index.html
 On the USG Warning and Consent Banner page, acknowledge the warning by scrolling to the bottom of the page and click the OK button.
 Enter the appropriate SVA server administrator username and password. Click the Login button.
 On the Welcome to Tumbleweed Valicert Validation Authority 4.11.1 window, in the left window pane under the CONFIGURATION menu, click CRLs CRL import.
 On the Configure CRL Import page, click the Upload Config button.
 On the Upload Publisher Configuration page, click the Browse… button, and browse to the NIPR NCVI v4.0.0 for COMPOSE v4.0.0 installation media, \Configuration\ folder.
 Select the vpublish_DoD­_Stand_Alone_v2.0.txt file and click the Open button.
 On the Upload Publisher Configuration page click the Upload Publisher Configuration button.
 On the Configure CRL imports page, under the CRL Source column, you should see sources for each CA’s CRL which should indicate they are located in the E:\CRLs\ folder.
 In the left window pane under the CONFIGURATION menu, click the Start/Stop Server menu option.
 In the right window pane on the Server Start/Stop page, click the Restart Server and continue to the next section.
NOTEWeekly, download the latest ALLCRLZIP.zip file, extract the files to the E:\CRLs\ folder and restart the SVA Server service.

2.25    Verifying CRLs Published to SVA Server

After performing the previous steps, it will take a few minutes for the all the CRLs to be published to the VA. To verify that all CRLs have been published follow these steps:

Table 17 – Verify CRLs Published to SVA Server

STEPDESCRIPTION
 From the CONFIGURATION menu, select CRLs CRL & OCSP Databases.
 On the CRL Summarypage, you should see a database table listing with all the DoD CA CRLs. Under the This Update (GMT) column, you will see a recent date and time listed for when the CRL was actually loaded into the CRL database. All CAs will eventually have an entry in this column. When all CAs CRLs show a current date/time, the import process is complete.
 If CRLs don’t show up or appear to be missing, log into the SVA server and check the E:\CRLs\ folder and ensure the CRL is present for the applicable CA. Also, open the vpublish DoD Stand Alone v1.0.txt file and verify the paths and file names are correct for the applicable CRL. If any changes are made to this file, the vpublish DoD Stand Alone v1.0.txt configuration file will need to be re-imported into the SVA server and the SVA server service will need to be restarted.
 Close all Internet Explorer windows and log off SVA Server.

2.26    Remove the Manual CRL Import Configuration

Once the issue with the SVA server not being able to connect to the NOC MVA server has been resolved, this configuration is no longer needed and could possibly interfere with regular SVA operation.  To remove the manual CRL update configuration on the SVA server, follow these steps:

Table 18 – Remove the Manual CRL Import Configuration

STEPDESCRIPTION
 Log on to the SVA server as a domain administrator.
 Double-click the Tumbleweed Valicert Validation Authority (TMs) Administration icon from the desktop.
 At the USG Warning and Consent Banner page, click the OK button.
 Enter the appropriate SVA server username and password. Click the Login button.
 On the Welcome to Tumbleweed Valicert Validation Authority 4.11.2 window, in the left window pane under the CONFIGURATION menu, select CRLs CRL import.
 On the Configure CRL Import window, in the right window pane, select the check box next to CRL Source.    Note!  By selecting this check box, it will select all the CRL source check boxes below.
 Scroll down and click the Delete button at the bottom of the page.    Note!  The Configure CRL Imports page will no longer have any CRL Source entries listed.
 In the left window pane, under the CONFIGURATION menu, click the Start/Stop Server menu option.
 In the right window pane, under the Server Start/Stop page, click the Restart Server button.
 Close all Internet Explorer windows and log off the SVA server.
NOTEOnce the SVA server restarts, it will connect to the NOC MVA server to download CRLs and/or CRL deltas. If after 30 minutes none of the CRLs listed on the CRL Summary page appear to update, review the Server logs to determine the cause.
NOTEIf the vpublish standalone v1.0.txt file has been imported numerous times (for various reasons) there may be multiple copies of CRLs listed in the table on the Configure CRL Imports page. Perform the steps above to remove the configurations for manual CRL imports and restart the SVA server service from the administrator console. Then re-import the vpublish DoD Stand Alone v1.0.txt configuration file. Restart the SVA server service.

3      Domain Controller Certificate Renewal SOP

This section describes the Standard Operating Procedure (SOP) for domain controller certificate renewal.

3.1        Purpose

This section provides procedures to the Domain Administrator on how to renew the Domain Controller certificate and delete expired certificates from the Domain Controller certificate stores and Active Directory.

3.2        Background

The Domain Controller certificates expire three years after their issuance. For this reason, the Domain Controller certificate needs to be renewed at least thirty days prior to expiration. In addition, the expired certificate needs to be removed from the Domain Controller certificate stores and Active Directory.

3.3        Create the Required Scripts and Files for DC Certificates

Information from the Domain Controllers will need to be gathered to request and properly install the Domain Controller DoD-issued Certificates. The GrabDCinfo_v2.0.1.vbs script will create the files, folders and scripts required to request and install the DoD-Issued DC certificates.

Table 19 – Obtain DC GUID and Create Batch Files

STEPDESCRIPTION
 Log into DC0001 as a domain administrator, if not already logged in.
 Open a cmd prompt:   Click Start, in the Start Search field enter cmd. In the listing above, right-click cmd.exe and select Run as administrator.
 At the UAC prompt, click the Continue button.
 At the Command Prompt window prompt, change drives to the E: drive and navigate to the E:\DC_Tools\Scripts\ folder.   E:    [ENTER] cd \DC_Tools\Scripts  [ENTER]
 At the Command Prompt window prompt, run the grabdcinfo script.   cscript GrabDCinfo_v2.0.1.vbs   [ENTER]   Note!  The GrabDCinfo_v2.0.1.vbs script will create a folder for each DC that exists.  Under the E:\DC_Tools\ folder, the folders will be named with the FQDN of the domain controllers with a date appended to the end of the file name.   Example: DCinfoCVN75GCSDC0001.cvn75.navy.mil20180124 DCinfoCVN75GCSDC0002.cvn75.navy.mil20180124   Within each DC’s folder, there will be three sub-folders (certs, CertTool and Scripts) and a text file named getguid<FQDN>.   Example: getguidCVN75GCSDC0001.cvn75.navy.mil.txt
 In the Command Prompt window, type exit and press [ENTER] to close the Command Prompt window.

3.4        Copy each DCinfo… Folder to the Appropriate Domain Controller

Copy the DCinfo folder for each Domain Controller to the appropriate Domain Controller’s E: drive.

Table 20 – Copy each DCinfo folder to Appropriate DC

STEPDESCRIPTION
 Log into DC0001 as a domain administrator.
 Using Windows Explorer, navigate to the E:\DC_Tools\ folder.
 Right click on the DCinfo… folder that is specific to DC0001 and select Copy.
 Navigate to the root of E:\, right click in the white area of the window and select Paste.   Note!  It is possible the previous DCinfo… folder is still present in the root of the E: drive. This folder may be deleted to reduce confusion.
 Navigate to the E:\DC_Tools\ folder.
 Right click on the DCinfo… folder that is specific to DC0002 and select Copy.
 Click StartRun… and in the Open: text field, type in: \\<DC0002>\e$ and click OK.   Note! Replace <DC0002> with the NETBIOS name of DC0002.
 In the white area of the Windows Explorer window, right-click and select Paste. This will copy the DCinfo… folder to the root of DC0002’s E: drive.   Note!  It is possible the previous DCinfo… folder is still present in the root of the E: drive.  This folder may be deleted to reduce confusion.
 Close all Windows Explorer windows.

3.5        Create the Certificate Request for each DC in the Domain

The procedures in the section below will create certificate request files for the Domain Controllers.  This will need to be repeated on DC0002.

Table 21 – Create Certificate Request for DCs

STEPDESCRIPTION
 Log into DC0001 as a domain administrator (if not already logged in).
 Open a cmd prompt:   Click Start, in the Start Search field enter cmd. In the listing above, right-click cmd.exe and select Run as administrator.
 At the UAC prompt, click the Continue button.
 At the command prompt, change drives to the E: drive and go to the E:\DCinfo<DC0001 FQDN>\Scripts\ folder.   E:    [ENTER] cd \DCinfo      (Press [TAB] until the DCinfo<DC0001 FQDN plus date stamp> folder is shown). Press [ENTER]. cd Scripts\   [ENTER]
 At the Command Prompt window, do a directory listing and then run the script to create a certificate request file for the Domain Controller.   dir   [ENTER]   Note!  This will give you a listing of files in this folder so the entire script filename is known.   Type: DCcertReq and then press [TAB]; the rest of the file name should fill in.   Example: DCcertReqCVN75GCSDC0001.bat    Press [ENTER] to execute the script.   When completed, you’ll be prompted with Press any key to continue… Press any key on the keyboard to continue.
 In the Command Prompt window, type exit and press [ENTER] to close the Command Prompt window.
 Repeat steps 1 through 5 on DC0002, substituting DC0002’s information for DC0001.
 Return to DC0001.

3.6        Locate Certificate Requests for Domain Controllers

After the scripts have been run to generate the certificate requests, the certificate requests need to be moved to a centralized location.

Table 22 – Gather DC Certificate Files

STEPDESCRIPTION
 On DC0001, navigate to the E:\DCinfo<FQDN of DC0001><Date>\certs\DC_Cert\ folder and locate the certificate request file.   Example:  CVN75GCSDC0001.req   Highlight the two files: certificate request file and the empty <DC0001 FQDN>.cer files.
 Right click on the two highlighted files and select Copy.  Navigate to a centralized/shared location on the network where the files can be easily accessed later, Paste the files.   Note!  When both Domain Controllers are done up to this point, there should be two DC certificate requests and two empty DC certificate files at this location on each DC.
 On DC0001, navigate to the E:\DCinfo<FQDN of DC0001><Date>\ folder, right-click the getguid<FQDN of DC0001>.txt file and select Copy.
 Navigate to the same network location where the DC certificate files are stored, right click and Paste the file to this folder.
 Close all Explorer windows.
 Repeat steps 1 through 5, substituting DC0002’s information for DC0001.
 Return to DC0001.

3.7        Submit Certificate Requests

Now that all the files needed for requesting certificates are ready in a single network location, the files will be used to request DoD-Issued Domain Controller certificates.  The following steps provide guidance for submitting the DC certificate requests.

Table 23 – Submit Certificate Requests

STEPDESCRIPTION
 Log into a workstation as a user that has access to the file location where the Domain Controller certificate request files are stored.
 Open an Internet Explorer window and type in the URL of the CA which you will request the certificate from.   Note!  Although it is not necessary, it is recommended that the same DoD CA be used for all certificate requests.
 On the Certificate Manager page, click on the Manual PKCS10 Domain Controller 2048-bit Certificate Enrollment hyperlink.
 On the Certificate Profile – Manual PKCS10 Domain Controller 2048-bit Certificate Enrollment page, ensure PKCS#10 is selected for the =Certificate Request Type field.
 Open a Windows Explorer window and navigate to the network location where the Domain Controller certificate request files are stored.
 Right click on the certificate request file for DC0001, select Open With… and select Notepad.
 Uncheck the Always use the selected program to open this kind of file checkbox and click OK.
 In the Notepad window, from the file menu, click Edit Select All.
 Again from the file menu, click EditCopy.
 Close the Notepad window.
 Back on the Certificate Request Inputpage, enter the following: Certificate Request: (Click in the white area of this field, right click and select Paste. Enter the following information for a designated shipboard administrator to be POC for this request. Requestor Name:  (Enter the SVA administrator’s name) Requestor Email: (Enter the SVA administrator’s email account.) Requestor Phone: (Enter the SVA administrator’s phone number.)
 Return to the Windows Explorer window, navigate to the network location where the DC certificate request files are located and open the getguid<FQDN of the Domain>.txt file that is specific for DC0001 in Notepad.
 In the Notepad window, after DNS= text, highlight the FQDN of the Server, right click the text and select Copy.
 Return to the Internet Explorer window, right click in the text field for DNS Name and select Paste.
 Return to the Notepad window, highlight the text after GUID: to the end of the line, right click and select Copy.
 Return to the Internet Explorer window, right-click in the text field for GUID and select Paste.
 Verify the entries on this request page.  Once verified, click the Submit button to submit the request.   Note!  It is possible that by using Internet Explorer, the Submit button will not be visible. Using Firefox, follow the steps above again to submit the certificate request.
 From the Certificate Profile page, record the request ID that is displayed.  Also, take a screenshot of this page and save it for later use.
 Close all Notepad windows.
 From the Internet Explorer page, click the List Certificate Profiles hyperlink if DC0002’s certificate request still needs to be processed.
 Repeat steps 3 through 19 substituting DC0002’s information for DC0001.
 Close all Internet Explorer windows.
 Work with the local Information Assurance Manager (IAM) or Information Assurance Officer (IAO) to send a digitally signed email to the Registration Authority (RA), providing notification that the certificate requests are ready for review and approval. 
 The NAVAL COMMUNICATIONS SECURITY MATERIAL SYSTEM (NCMS) provides Registration Authority support for all server (SSL) certificates.   Atlantic region installs: Merkeshia McKnight (RA) (240)857-9865; Alesia Blake(RA) (240)857-9735; NCMS_NAFW_NAVY_PKI@navy.mil   Pacific region installs: Michelle Hughes(RA) (808)472-0388; NCMS_NAFW.PKI_HI@navy.mil   The following must be included in the digitally signed email: Reference Number from CA: <Request ID#>   Note!  The Request ID # from CA-XX was obtained in step 18 where XX is the number of the DoD CA used for the certificate requests.   Host Name:  <Servers Hostname>Applications on Server:  <Description of Apps on Server> (e.g., Domain Controller, Sharepoint Web Server, etc.)   Note!  If the requestor does not receive anything from LRA/RA within one – two days after the initial email has been sent, resend email or contact the LRA/RA by phone.  Have the Request ID # ready for reference. 

3.8        Retrieve the DC Certificates

The RA will notify you via e-mail once the certificate requests have been approved and the certificate is ready for download.  When notified, follow the steps below to retrieve the DoD PKI Domain Controller certificates.

Table 24 – Retrieve the DC Certificates

STEPDESCRIPTION
 Log into a workstation as a user that has access to the file location where the Domain Controller certificate request files are stored.
 Open the Internet Explorer web browser and navigate to the DoD CA URL where the certificate request was submitted.
 At the DoD Warning prompt, click OK.
 On the Certificate Profile page, click on the Retrieval tab.
 On the Check Request Status page, in the Request identifier: field, enter the request ID that was previously recorded and click the Submit button.
 On the Request Status page, verify the Status: shows as complete. If the request is not complete, the certificate will not be able to be downloaded.
 Click on the blue underlined text to the right of Issued certificate:   Note!  The blue underlined text is the serial number of the certificate.
 Once the Certificate page displays, showing the Certificate contents, scroll down to the Installing this certificate in a server section.
 Under Base 64 encoded certificate section, highlight all text from “—-BEGIN CERTIFICATE” to “END CERTIFICATE—–“ making sure to include the dashes.
 Right click the highlighted text and select Copy.
 Open Windows Explorer and navigate to the network location where the DC certificate request and blank Domain Controller certificate files are stored.
 Right-click on the empty <FQDN of DC0001>.cer file, select Open With… and select Notepad.
 Uncheck the Always use the selected program to open this kind of file checkbox and click OK.
 From the Notepad file menu, click Edit and then Paste.
 From the file menu, click File and Exit to save the file.
 When prompted to save changes, click the Save button.
 If the certificate for DC0002 still needs to be downloaded, on the Internet Explorer page for retrieving certificates, click the Check Request Status hyperlink to enter the request ID number for DC0002.
 Repeat steps 4 through 15 substituting DC0002’s information for DC0001.
 Close all Windows Explorer and Internet Explorer windows.
 Log off the domain workstation.

3.9        Install the DC Certificates on the Domain Controllers

The domain controller certificates need to be installed in the local computer certificate stores on DC0001 and DC0002. The procedures below will provide guidance to install the DoD-issued domain controller certificates in the domain controller local computer certificate stores.

Table 25 – Install the DC Certificates on the Domain Controllers

STEPDESCRIPTION
 Log on to DC0001 as a domain administrator.
 Open Internet Explorer and navigate to the network location where the Domain Controller certificate and certificate request files are stored.
 Right click and select Copy on the <FQDN of DC0001>.cer file.
 Navigate to the E:\DCinfo<FQDN of DC0001><Date>\certs\DC_Cert\ folder, right-click in the open area of this folder and select Paste to paste the file to the folder.
 Close all Windows Explorer windows.
 Repeat steps 1 through 5, substituting DC0002’s information for DC0001.
 If not already logged on, log on to DC0001 as a domain administrator.
 Open a cmd prompt:   Click Start, in the Start Search field enter cmd. In the listing above, right-click cmd.exe and select Run as administrator.
 At the UAC prompt, click the Continue button.
 At the Command Prompt window prompt, change drives to the E: drive and navigate to the E:\DCinfo<FQDN of DC0001>\Scripts\ folder.   E:    [ENTER] cd \DCinfo*\Scripts  [ENTER]
 At the Command Prompt window prompt, perform a directory listing and then run the script to install the certificate for the Domain Controller. dir   [ENTER]   Note!  This lists the files in this folder so the entire script filename is known.   DCcertAccept<DC0001>.bat   [ENTER]   Hint:  After typing DCcertAccept, press the [TAB] key and the rest of the filename will fill in.   Note!  After running the script, look for error messages to make sure the batch file ran properly.
 Double click the Certificates MMC from domain administrator’s desktop.
 At the UAC prompt, click the Continue button.
 Expand CertificatesPersonalCertificates.
 Ensure the <DC0001> certificate is installed in this location.
 Highlight, right click the old Domain Controller certificate and select Delete.
 Close the Certificates console.
 Repeat steps 7 through 14 on DC0002, replacing DC0001 with DC0002’s specific information.

3.10    Update the AD DC Store

As well as importing the Domain Controller certificates to the local computer certificate stores of both Domain Controllers, the same certificates must be published to Active Directory to the domain controller objects in Active Directory.

Table 26 – Update the AD DC Store

STEPDESCRIPTION
 While still logged in as a domain administrator on DC0001, at the Command prompt, navigate to the E:\DCinfo<DC0001><Date>\scripts\ folder.   E:   [ENTER] cd \DCinfo*\scripts   [ENTER]
 Remove the previous Domain Controller certificates in Active Directory.  The commands below will bring up a window to select the certificates.  Click OK to delete the certificate from Active Directory.  Repeat for each Domain Controller. Certutil –viewdelstore “ldap:///CN=<Domain Controller>,OU=Domain Controllers,DC=<Domain>,DC=NAVY,DC=MIL?usercertificate”     Example: Certutil –viewdelstore “ldap:///CN=cvn65ucsDC0001,OU=Domain Controllers,DC=cvn65,DC=NAVY,DC=MIL?usercertificate”   [ENTER]  
 Execute the DCcertPublish<DC0001>.bat script.   Hint!  After typing DCcertPublish, press the [TAB] key and the rest of the filename will fill in.
 After the script runs, look for error messages to make sure the batch file ran properly.
 While logged into DC0002 as a domain administrator, repeat steps 1 through 3, replacing DC0002’s information for DC0001.
 Return to DC0001 and verify that DC0001’s certificate was imported into Active Directory by entering the following commands at the command prompt: Note!  Substitute the NETBIOS name of DC0001 for <Domain Controller>   Certutil –viewstore “ldap:///CN=<Domain Controller>,OU=Domain Controllers,DC=<Domain>,DC=NAVY,DC=MIL?usercertificate”     Example: Certutil –viewstore “ldap:///CN=cvn65ucsDC0001,OU=Domain Controllers,DC=cvn65,DC=NAVY,DC=MIL?usercertificate”   [ENTER]  
 A View Certificate Store window will open displaying the certificates for DC0001. Verify this is the new DoD-Issued certificate for the Domain Controller.   Note!  If the window is blank, the DCcertPublish script for the Domain Controller didn’t run properly. Possibly the downloaded DoD-issued certificate was not copied to the correct folder prior to running the DCcertPublish script.
 Repeat step 6 through 7 again, this time substituting the NETBIOS name for DC0002 for DC0001.
 Close all command prompt windows on both DC0001 and DC0002.

3.11    Back-up the Domain Controller Certificate

Once the DoD-issued certificates for DC0001 and DC0002 have been properly installed, a backup of the certificates will prevent the need to repeat the request process again for the certificates again in case there is a reason to reload the DC certificate(s).  The procedures below provide guidance to back-up the domain controller certificates.

Table 27 – Backing up the Domain Controller Certificates

STEPDESCRIPTION
 Log into DC0001 as a domain administrator and open the Certificates console. The Certificates icon should still be on the desktop.
 At the UAC prompt, click the Continue button.
 Expand the PersonalCertificates containers.
 Export the certificate and private key pair of the Domain Controller.   Right click on DC0001’s certificate and click All TasksExport….
 Click the Next button.
 Select the Yes, export the private key radio button and select Personal Information Exchange – PKCS # 12(.PFX) checkbox.
 Click Next.
 Type in password (twice) which will be used when importing the certificate back into the Domain Controller if the need arises. Click the Next button.
 Click the Browse button and select a location and name for the certificate. Example:  CVN65UCSDC0001_backup.pfx   It is suggested that the certificate key pair is handled as would any controlled media and be accessible, if needed, for reinstallation.   Click the Save button.
 Click the Next button.
 Click FinishOK.
 Repeat steps 1 through 10 to back up the certificates on DC0002.
 Each Domain Controller should only have one certificate in their Personal Certificates store.

This Page Intentionally Left Blank

4      Member Server IIS Website Certificates

This section provides information on Member Server (MS) Internet Information Server (IIS) website certificates.

4.1        Introduction

This section provides procedures for the Web Server Administrator on how to renew the Web Server certificate on a Microsoft Internet Information Services (IIS) 7.0 Web Server without removing the old certificate while waiting for the new certificate to get approved.

4.2        IIS Certificate

The MS IIS certificate is required to provide a secure website using the HTTPS protocol. All DoD-issued certificates expire every three years. The procedures below will walk the administrator through how to request and replace the expiring IIS website with a newly issued DoD certificate.

4.2.1   Generate Certificate Request for IIS Server

Perform the steps in the following table to generate a certificate request for each website.

Table 28 – Generate Certificate Request for IIS Server

STEPDESCRIPTION
 Log on to an IIS server with an expiring certificate as a domain administrator.
 Open the Internet Information Services (IIS) Manager. Click Start  Administrative Tools Internet Information Services.
 At the UAC prompt, click the Continue button.
 In the left pane, select the servername.
 In the middle pane under the IIS section, double-click the Server Certificates.
 In the right pane under Actions, click Create Certificate Request…
 On the Distinguished Name Properties page, enter the following information:   Common name:    <FQDN of the server> Organization:    U.S. Government Organization unit:    USN PKI DoD City/locality: <Homeport city>  (e.g., Norfolk) State/province: <Homeport state>  (e.g., VA) Country/region: US Click the Next button.
 On the Cryptographic Service Provider Properties page, for the Cryptographic service provider field shows Microsoft RSA Schannel Cryptographic Provider.
 For the Bit length field, select 2048 from the pull-down control.
 Click the Next button.
 On the File Name page, click the […] to the right of the Specify a file name for the certificate request: field. Browse to a location that is easy to access when logged onto a domain workstation to submit the certificate request.
 Once the file location is set, click the pulldown for the field that shows *.txt. Change this field to *.*.
 In the File name: field, enter a descriptive filename for the certificate request with the req file extension (e.g., CVN65UCSFS0001.req). 
 Once the folder location is selected and the filename is filled in, click the Open button.
 When returned to the File Name page, click the Finish button.
 Repeat the procedures in this table for any other IIS servers that have expiring certificates.

4.2.2   Submit IIS Server Certificate Request

The next step in requesting a DoD issued certificate for the COMPOSE Member Server is to submit a certificate request to a DoD CA server.

Table 29 – Submit Certificate Request

STEPDESCRIPTION
Submit Certificate Request for COMPOSE Member Server from DoD CA:
 Log on a domain workstation as a domain user.
 With your CAC card inserted into the CAC reader, open an Internet Explorer window and navigate to https://infosec.navy.mil/PKI/server.jsp. From Windows Security, select one of your certificates to log on to the Infosec website and click OK.  Enter your CAC PIN and click OK.
 Infosec’s website will list hyperlinks to DoD CA websites that provide forms to request DoD.  Click on one of the hyperlinks to access the DoD CA’s website for requesting DoD-Issued certificates.    Note!  If possible, use the same DoD CA website for all certificate requests for simpler tracking purposes.
 If a prompt indicates that there is a problem with the website’s security certificate, click Continue to this website (not recommended).
 At the DoD Warning prompt, click the OK button.
 From the selected DoD CA website, the Certificate Profile page will display. 
 Ensure the Enrollment tab is selected.
 Click on the Regular 2048-bit SSL Server Enrollment hyperlink. The Certificate Profile – Regular 2048-bit SSL Server Enrollment page will display.
 Open a Windows Explorer window and navigate to the shared network location where the certificate requests for the COMPOSE Member Servers are stored.
 Open the first COMPOSE Member Server certificate request file in Notepad.
 In the Notepad File menu, select FormatWord Wrap.
 In the Notepad window, highlight all of the text for the certificate, including the “——BEGIN CERTIFICATE REQUEST——” header and the “——END CERTIFICATE REQUEST——” trailer, including all the dashes. Right click the highlighted text and select Copy.
 Return to the Internet Explorer Certificate Profile – Regular 2048-bit SSL Server Enrollment page, fill out the form as follows: For the =Certificate Request Type field, ensure PKCS #10 is selected. In the Certificate Request text box, right click and select Paste. Complete the following informational fields: Requestor Name<Name> Requestor Email:  <Email> Requestor Phone:  <Phone>   Once all fields are filled in on the webpage, click the Submit button.
 The Request Successfully Submitted web page appears.  This page will provide the Request ID # for the certificate. Print, or by other means, document the Request ID #
 Close the Notepad window for the certificate request.
 If there are more COMPOSE Member Server certificate requests to process, return to the Windows Explorer window and open the next certificate request in Notepad.  On the IE Browser window, click the List Certificate Profiles hyperlink. Repeat steps 8 – 15 to process the next certificate request.
 Work with the local Information Assurance Manager (IAM) or Information Assurance Officer (IAO) to send a digitally signed email to the Registration Authority (RA), providing notification that the certificate requests are ready for review and approval. 
 The NAVAL COMMUNICATIONS SECURITY MATERIAL SYSTEM (NCMS) provides Registration Authority support for all server (SSL) certificates.   Atlantic region installs: Merkeshia McKnight (RA) (240)857-9865; Alesia Blake(RA) (240)857-9735; NCMS_NAFW_NAVY_PKI@navy.mil   Pacific region installs: Michelle Hughes(RA) (808)472-0388; NCMS_NAFW.PKI_HI@navy.mil   The following must be included in the digitally signed email: Reference Number from CA: <Request ID#>   Note!  The Request ID # from CA-XX was obtained in step 14 where XX is the number of the DoD CA used for the certificate requests. Host Name:  <Servers Hostname> Applications on Server:  <Description of Apps on Server> (e.g., Domain Controller, Sharepoint Web Server, etc.) Note!  If the requestor does not receive anything from LRA/RA within one – two days after the initial email has been sent, resend email or contact the LRA/RA by phone.  Have the Request ID # ready for reference. 
 Log off the COMPOSE Workstation.

4.2.3   Retrieve COMPOSE Member Server Certificates

Once an email has been received stating the certificates are approved and are ready for retrieval, use Internet Explorer to browse to the issuing DoD CA site where the requests were originally submitted.

Table 30 – Retrieve DoD-Issued Certificates

STEPDESCRIPTION
Retrieve DoD-Issued Certificates for COMPOSE Member Server Websites:
 Log on a domain workstation as a domain user.
 Using Internet Explorer, navigate to the URL which was used to request the server certificate.   Note!  If the link to the DoD CA that was used to request the certificates is unknown, the following URL can assist in determining the correct URL to retrieve the approved certificates:  https://infosec.navy.mil/PKI/server.jsp.
 If a prompt appears indicating that there is a problem with the website’s security certificate, click Continue to this website (not recommended).
 At the DoD Warning prompt, click OK.
 When the Certificate Profile page displays, click the Retrieval tab.
 On the Check Request Status page, in the Request identifier: field, enter the first request ID that was previously recorded and click the Submit button.
 The Status of the certificate should show completeNote!  If the status is not complete, the following steps can’t be performed.   To the right of Issued certificate, click the highlighted certificate serial number (e.g., 0x00007453).
 On the Certificate Contents page, highlight the text under Base 64 encoded certificate including the ——BEGIN CERTIFICATE—— header and the ——END CERTIFICATE—— trailer with all the dashes.   Note!  Do NOT use the section that includes the CA certificate chain.
 Right click the highlighted text and select Copy.
 Open Notepad. Paste the text copied from the webpage into the Notepad window.  Click File and then Save As. Navigate to the shared network location for the certificates that can be accessed from the workstation and COMPOSE Member Servers. Provide a descriptive name for the certificate. Example:  cvn65ucsex01_cert.cer. Click Save.
 Close the Notepad window.
 If there are more certificates to retrieve, return to the Internet Explorer page and click the Check Request Status hyperlink.  Repeat steps 6 – 11 to retrieve the remaining certificates.
 After all the certificates are downloaded, log off the domain workstation.

4.2.4   Install and Replace the New COMPOSE Member Server Certificate

The following steps will assist in installing the COMPOSE Member Server certificates. This section assumes the certificate being installed is for the Default Website. If the certificate is to be installed on other sites on the server, modify the steps accordingly.

Table 31 – Install and Replace IIS Server Certificate(s)

STEPDESCRIPTION
 Log on to a COMPOSE Member Server to install the new DoD-issued certificate as a domain administrator.
 Ensure the DoD-issued certificate for the COMPOSE Member Server is in a location that is easily accessible from the COMPOSE Member Server.
 Open the Internet Information Services (IIS) Manager console. Click Start Administrative Tools Internet Information Services (IIS) Manager.
 At the UAC prompt, click the Continue button.
 At the Internet Information Services (IIS) Manager window, select the servername for <MS0001>.
 In the center window pane, under IIS, double-click on the Server Certificates icon.
 In the right pane, under Actions, click on Complete Certificate Request…
 At the Specify Certificate Authority Response page, for the File name containing the certificate authority’s response:” field, click the […] button to the right of the field, navigate to the location of the downloaded certificate for <MS0001>.
 In the Friendly name: field, enter a name for the certificate.   e.g.,  CVN65UCSMS0001_IIS (if the previous certificate was named the same, change the name slightly so you can easily identify the new certificate.)
 Click the OK button.
 With the servername selected in the left window pane of the Internet Information Services (IIS) Manager window, in the middle window pane you will see the new certificate that was just added.
 In the left pane, expand <Server> (local computer) SitesDefault Web Site.
 In the right pane, under the Edit Site section, click Bindings…
 Highlight the line that begins with https under the Type column. Click the Edit button.   Note! If the https line is not present, click the Add button to the right of the Site Bindings window.   In the Add Site Binding window, select the following: For the Type field, click the pull down and select https.For the IP Address: field, leave All Unassigned selected.For the Port: field, leave 443 selected. For the SSL certificate: field, select the friendly name of the certificate that was just added. (e.g., CVN65UCSMS0001_IIS)   Click the OK button. At the Site Bindings window, click the Close button.
 In the left pane, select the <server name> (e.g., CVN65UCSMS0001).
 In the right pane, under Actions, click Restart.
 Close the Internet Information Services (IIS) Manager window.
 Log off <MS0001>.
 Repeat the steps in this table for remaining COMPOSE Member Servers with certificates that need to be installed.

4.2.5   Backup the COMPOSE Member Server Certificate

Once the new DoD-Issued COMPOSE Member Server certificate is installed and working properly, it is recommended that the certificate’s keys be backed up, so if a casualty were to occur, the certificate could be restored quickly without having to go through the request and installation processes again.

Table 32 – Backup/Export the IIS Web Server Certificate

STEPDESCRIPTION
 Open the Certificates MMC, if it is not already open.
 If required, at the UAC prompt, click the Continue button.
 Right click on the server certificate (e.g., cvn65ucsex0001.cvn65.navy.mil) and select All Tasks Export.
 On the Welcome to the Certificate Export Wizard page, click the Next button to continue.
 On the Export Private Key page, select the Yes, export the private key radio button and then click on the Next button.
 On the Export File Format page, configure the three options below as follows:   Include all certificates in the certificate path if possible is checked.Delete the private key if the export is successful is unchecked.Export all extended properties is checked.   Click the Next button.
 On the Password page, enter a password for the Password: and Confirm password: text fields. Ensure the password is kept in a secure location.
 Click the Next button.
 On the File to Export page, click Browse…
 On the File to Exportpage, choose the file name you want to save this as and location. Do not include an extension in your file name; the wizard will automatically add the PFX extension for you. Click on the Browse… button to make this choice.
 Once a filename and location has been selected and saved, click on the Next button to continue.
 On the Completing the Certificate Export Wizard page, click the Finish button.
 At theThe export was successfulprompt, click the OK button.
 Close the Certificates MMC and log off the COMPOSE Member server.
Note!Burn the exported IIS Web Server Certificates and private keys to CD/DVD ROM and keep in a secure location. Remove any copies of the exported IIS Web Server Certificates with private keys from all domain locations. Ensure there is a way to document the passwords used with these exported files since they will need to be known to import the certificates in the future if the need arises.

4.3        Restore IIS Server Certificate to Web Server

Perform the steps in this section to install a previously exported Server Certificate (.pfx file) for a specific web server, into that Web Server and configure it for use with the default web site.

Table 33 – Import Exported Certificate into Server’s Certificate Store

STEPDESCRIPTION
 Open the Internet Information Services (IIS) Manager console. Click Start  Administrative Tools Internet Information Services (IIS) Manager.
 At the UAC prompt, click the Continue button.
 In the left pane of the Internet Information Services (IIS) Manager window, select the <server name>.
 In the middle pane under the IIS section, double-click the Server Certificates.
 In the right pane under Actions, click Import…
 In the Import Certificate window, to the right of the Certificate file (.pfx): field, click the […] button.
 Navigate to the location of the saved COMPOSE Member Server PFX file and highlight the file. Click the Open button.
 Back in the Import Certificate window, in the Password: field, enter the password for the certificate. (Password should be documented)
 Ensure the Allow this certificate to be exported checkbox is selected.
Assign Server Certificate to the Default Web Site
 In the left pane, expand <Server> (local computer) → SitesDefault Web Site.
 In the right pane under Actions, click Bindings.
 In the Site Bindings window, select the https line and click the Edit… button.
 Ensure the IP Address field shows : All Unassigned and the Port : field is 443.
 Click the pulldown control button to the right of the SSL certificate field. In the list of certificates displayed, select the one certificate that is the certificate which was just installed. Click the View… button to the right to view the certificate properties to verify.
 Once the certificate is selected, click the OK button.
 On the Site Bindings window, click the Close button.
 In the left pane, highlight the <server name>.
 In the right pane under Actions, click Restart.
 Close the Internet Information Services (IIS) Manager console.
 Test the website.
 Log off the COMPOSE Member Server.

This Page Intentionally Left Blank

5      SmartCard Logon Management

This section provides information on how to enable and disable the SmartCard logon requirement for user accounts.  Section 5.1 describes how to configure user accounts to enable Cryptographic Logon (CLO) and Section 5.2 describes how to configure user accounts to disable CLO.

5.1        Enable SmartCard Only Logon

NCVI v4.0 provides administrators with the capability to enable users to login to the network using their SmartCard and PIN only. The procedures in the following table describe how to configure the system to enforce CLO for specified user accounts.

Table 34 – Configure User Account(s) to Force SmartCard Logon(s)

STEPDESCRIPTION
 Log on to DC0001 as a domain administrator.
 Click Start Administrative ToolsActive Directory Users and Computers <FQDN of the Domain>COMPOSE Users and Computers COMPOSE Users OU.   At the User Account Control prompt, click Continue.   Note!  This step assumes the user accounts reside in the COMPOSE Users OU. If the accounts exist in another OU, navigate to this OU instead.
 Highlight the specific user account(s) that require a CLO logon, right-click and select Properties.
 In the Properties for Multiple Items window, select the Account tab.
 In the Account options section of this window, scroll down through the options until Smart card is required for interactive logon is visible.
 Select the white checkbox to the far left of Smart card is required for interactive logon to enable a change to be made to this account option.
 The gray box immediately to the left of Smart card is required for interactive logon becomes white. Check this box to enable this option for the selected users.
 Click the OK button to close the Properties for Multiple Items window.
 If selecting small group of users at a time, repeat steps 3 through 8 as many times as needed to configure the setting for only those user accounts that access the domain with a SmartCard.
 Close the Active Directory Users and Computers console.

5.2        Disable SmartCard Only Logon

Various situations may occur where users are unable to logon using their smartcard and PIN. For example, a user’s CAC has expired and the user needs to access the domain until a new CAC is obtained. The procedures in this section provide guidance on removing the requirement to login with SmartCard only and allow the user to logon using username and password credentials. The procedures in the following table describe how to configure the system to disable the CLO setting on user accounts.

Table 35 – Configure User Account(s) to Not Require SmartCard Logon(s)

STEPDESCRIPTION
 Log on to DC0001 as a domain administrator.
 Click Start Administrative ToolsActive Directory Users and Computers <FQDN of the Domain>COMPOSE Users and Computers COMPOSE Users OU.   At the User Account Control prompt, click Continue.   Note!  This step assumes the user accounts reside in the COMPOSE Users OU. If the accounts exist in another OU, navigate to this OU instead.
Highlight the specific user account(s) granted temporary exemption from CLO logon, right-click and select Properties.
In the Properties for Multiple Items window, select the Account tab.
In the Account options section of this window, scroll down through the options until Smart card is required for interactive logon is visible.
In the Account options section of this window, select the white checkbox to the far left of Smart card is required for interactive logon to enable a change to be made to this selection.
The gray box immediately to the left of the checkbox label will now be colored white. Leave this white box unchecked.
Click the OK button.
If selecting small groups of users at a time, repeat steps 3 through 8 as many times as needed to remove the setting for only those user accounts permitted to access the domain without using CLO.
Reset password for each individual user account no longer configured for CLO:
The System Administrator should highlight one of the user accounts changed to no longer requiring SmartCard logon.  Right click on it and select Reset password….  Enter a temporary password in the New password and Confirm password fields.  Do not change default checkbox settings.  The User must change password at next logon checkbox should remain checked so that the user is forced to change the password on first login.  Click OK.   Repeat this step for each user account granted temporary access to the domain without the use of the SmartCard. 
Close the Active Directory Users and Computers console.

This Page Intentionally Left Blank

Leave a Reply

Your email address will not be published. Required fields are marked *

Table of Contents