1 Introduction
This document describes how to install a trusted certificate.
As shown in Figure 1, the trusted certificate installation consists of the following main steps:
- Certificate file creation for a trusted peer at the Certification
Authority (CA). Requesting a certificate for a peer is done by the
peer.
- Note:
- The procedures how a trusted peer gets a certificate file
from a CA, how to create the certificate at the CA, and how the certificate
file is delivered to the operator for installation are outside the
scope of this document. The procedures can vary, depending on the
CA and the trusted peers. The trusted peer can be a node or a host
in the operator's own network, or a node in another operator network.
The trusted certificate can have been signed by the same CA as the
operator uses or signed by another CA that the operator trusts.
For the scope of this document, it is sufficient to assume that the trusted peer has a certificate and that a certificate file for it has been delivered to the operator and copied to an SSH File Transfer Protocol (SFTP) server (in this document named host1), which allows SFTP access from the Managed Element (ME).
- Reception of the certificate file for a trusted peer in an external host.
- Trusted certificate installation in the ME. During this step, the ME copies the certificate file from the external host to the ME with the SFTP and installs it as a trusted certificate.
The installation is activated in the CertM=1 context after the X.509 certificate file in Privacy Enhanced Mail (PEM) or Distinguished Encoding Rules (DER) format is uploaded to the node. This procedure automatically creates a TrustedCertificate Managed Object (MO), whose attribute certificateContent represents the installed certificate.
1.1 Prerequisites
This section describes the prerequisites, which must be fulfilled before using the procedure.
1.1.1 Conditions
The following condition must apply:
- The user has the System Security Administrator role.
- The trusted certificate to install is available.
- The name and path to the certificate file in host1 are known.
In this document, file trustedCertificate1.pem is stored in host1 in the home directory for hostuser1.
- The fingerprint for the trusted certificate is known.
In this document, the fingerprint is c2:91:ac:4f:b3:00:f0:98:28:47:36:b1:eb:d9:66:33:69:05:7d:c4.
- The address, username, and password for the SFTP server
in the external host are known.
In this document, the username is hostuser1 and the password is hostuser1pwhost1.
- An Ericsson Command-Line Interface (ECLI) session in Exec mode is in progress.
2 Procedure
Certificate File Creation in CA
The procedures for requesting a certificate file for a trusted peer from the CA or the peer are outside the scope of this document. The procedures can vary, depending on the CA.
Reception of Certificate File from CA
The way the CA delivers the certificate file is outside the scope of this document. Here it is assumed that the PEM or DER file is received from the CA and that it is to be copied to host1, which is directly accessible from the ME with the SFTP.
Trusted Certificate Installation in ME
The certificate file received from the CA for a trusted peer is copied to the ME and installed. This is done with an MO action that downloads the certificate file to the ME with the SFTP from an external host (host1) and installs it to the ME as a trusted certificate.
The fingerprint, also known as digest, is used in this example procedure to control that a certificate file has not been compromised.
To install a trusted certificate:
- Navigate to the CertM MO, for example:
>dn ManagedElement=NODE06ST,SystemFunctions=1,SecM=1,CertM=1
- Install the trusted certificate, for example:
(CertM=1)>installTrustedCertFromUri --uri sftp://hostuser1@host1/home/hostuser1/trustedCertificate.pem --uriPassword hostuser1pw --fingerprint c2:91:ac:4f:b3:00:f0:98:28:47:36:b1:eb:d9:66:33:69:05:7d:c4
The fingerprint of file trustedCertificate1.pem is checked. The fingerprint must be entered in the defined format for the algorithm that the ME supports for calculating the fingerprint. The supported format for fingerprint can be read from the node with MO action (CertMCapabilities=1)>show fingerprintSupport. For more information on fingerprint, refer to Generate Fingerprint for File.
- Note:
- When referring to files that are relative to user home directory,
the syntax of the SFTP Uniform Resource Identifier (URI) format is
as follows:
sftp://<hostname>/~/cert.pem.
The fingerprint is calculated from the whole Certificate Management file, not only from the certificate it contains.
The system returns true or false.
- Verify that the certificate installation completed successfully:
(CertM=1)>show reportProgress
For a successful installation, the system returns the following:
result=SUCCESS resultInfo="installed from the certificate file"
If an error occurs during the execution of the action, attribute reportProgress shows result=FAILURE and resultInfo shows the cause of the failure. Repair the failure and restart the installation if needed.
The certificate installation automatically deletes file trustedCertificate1.pem in directory certificates.

Contents
