1 Description
This instruction describes how to install or renew a node credential manually with Certificate Signing Request (CSR), PKCS#10.
As shown in Figure 1, the installation or renewal consists of the following main steps:
- Enrollment data preparation in the Managed Element (ME).
- CSR file creation in the ME.
- Transferring the CSR file from the ME to an external
host with the SSH File Transfer Protocol (SFTP).
- Note:
- SSH File Transfer Protocol (SFTP) uses system-wide Secure Shell (SSH) algorithm setting defined in Ssh Managed Object (MO), see View SSH Algorithms.
- Submitting the CSR file from the external host to an external Certification Authority (CA) and requesting the CA to generate a certificate file in Privacy Enhanced Mail (PEM) or Distinguished Encoding Rules (DER) format.
- Certificate file creation in the CA.
The procedures for sending the CSR file to the CA, creating the certificate at CA, and receiving the certificate file from the CA are outside the scope of this instruction. The procedures can depend on the CA.
- Receiving the certificate file from the CA.
The procedures for sending the CSR file to the CA, creating the certificate at the CA, and receiving the certificate file from the CA are outside the scope of this instruction. The procedures can depend on the CA.
- Certificate file installation in the ME. During this step, the ME copies the certificate file to the ME with the SFTP and installs it. Enrollment action will automatically create chain certificates if they exists in the received enrollment data
2 Procedure
2.1 Install or Renew Node Credential by CSR
Prerequisites
- This instruction references the following documents:
- No tools are required.
- The following conditions must apply:
- The user has the System Security Administrator role.
- A user account for accessing the Managed Element (ME)
with the SFTP and downloading the CSR file from the ME is available.
In this instruction, the corresponding username is me_user1.
- The address, username, and password for the SFTP server
in the external host are known.
In this instruction, the username is hostuser1 and the password is hostuser1pw in host1.
- The name and path to the certificate file in host1 are known.
In this instruction, the external host is host1, the username is hostuser1, and the password is hostuser1pw. The certificate file node06stNodeCredential1.pem is stored in host1 in the home directory for hostuser1.
- The user has read access to the certificate file in the external host to be able to download it to the ME with the SFTP.
- The Certificate Authority (CA) used for certificates and the procedures for requesting certificates from the CA are known.
- The fingerprint of the certificate file (PEM or DER
file) has been provided by the CA administrator.
In this instruction, the fingerprint is ba:41:ac:4f:b3:00:10:98:28:47:36:b1:eb:d9:66:33:69:05:7d:c2.
- For a renewal, the NodeCredential MO to use is known.
- An Ericsson Command-Line Interface (ECLI) session in Exec mode is in progress.
Steps
- Navigate to the CertM MO, for example:
>dn ManagedElement=NODE06ST,SystemFunctions=1,SecM=1,CertM=1
- Select the appropriate action:
Installation: Proceed with Step 3.
Renewal: Proceed with Step 7.
- Enter Config mode:
(CertM=1)>configure
- Create a NodeCredential MO,
for example:
(config-CertM=1)>NodeCredential=1
- Specify the X.501 Distinguished Name (DN) name to be used
in the subject field of the requested certificate, for example:
(config-NodeCredential=1)subjectName="C=SE,O=Ericsson,CN=node06st.ericsson.com"
- Note:
- The only mandatory Relative Distinguished Name (RDN) required
in the DN is the Common Name (CN).
The value CN=node06st.ericsson.com is an example value. From a certificate syntax point of view, also other values such as CN=NODE06ST are valid. The value that is to be configured in the CN depends on the security policy in the organization for which the ME is installed. It also depends on the information the peer expects to receive in a certificate from the ME when the peer tries to connect to the ME using the service for which this node credential is used.
- Proceed with Step 9.
- Navigate to the NodeCredential MO,
for example:
(CertM=1)>NodeCredential=1
- Enter Config mode:
(NodeCredential=1)>configure
- Select the appropriate key
type and length, for the supported key types see CertMCapabilities MO keySupport attribute. Deprecated key
types are not recommended for new enrollments. For example, RSA_2048 that corresponds to 2048-bit long key generated
for the RSA algorithm
(config-NodeCredential=1)keyInfo=RSA_2048
- Commit the changes:
(config-NodeCredential=1)commit
- Start the enrollment by creating a CSR file in the given
local Uniform Resource Identifier (URI). The simplest case is to provide
only the filename, for example:
(NodeCredential=1)>startOfflineCsrEnrollment --uri node06stNodeCredential1.csr
The system returns true when successfully triggered, otherwise false.
The CSR file is created in the directory certificates, referred to by read-only attribute localFileStorePath in the CertM MO.
- Copy the CSR file from the ME to the external host (host1). In this example, the user starts from the shell
in host1, logs on with the SFTP to the
ME using username me_user1, and retrieves
the CSR file from the ME to host1 with
SFTP operation get:
- Open an SFTP session from the external host to the ME,
for example:
shell$ sftp me_user1@node06st
- Navigate to the folder containing the file, for example:
>cd certificates
- Copy the CSR file from the ME by using SFTP operation get and specifying the full filename, for example:
sftp>get node06stNodeCredential1.csr
- Exit the SFTP session:
sftp>exit
- Open an SFTP session from the external host to the ME,
for example:
- In ECLI, navigate to the CertM MO, for example:
>dn ManagedElement=NODE06ST,SystemFunctions=1,SecM=1,CertM=1
- Select the node credential to use, for example:
(CertM=1)>NodeCredential=1
- Install the certificate in the same NodeCredential MO
where the corresponding CSR file was created, for example:
(NodeCredential=1)>installCredentialFromUri --uri sftp://hostuser1@host1/home/hostuser1/node06stNodeCredential1.pem --uriPassword hostuser1pw --fingerprint ba:41:ac:4f:b3:00:10:98:28:47:36:b1:eb:d9:66:33:69:05:7d:c2
The credential password is not needed as the certificate is installed in PEM or DER format (option --credentialPassword is not used).
The fingerprint of file node06stNodeCredential1.pem is checked.
- Note:
- The fingerprint must be entered in the defined format for the algorithm that the ME supports for calculating the fingerprint. List supported formats using the command (CertMCapabilities=1)>show fingerprintSupport. For more information on fingerprints, refer to Generate Fingerprint for File.
The credential installation automatically deletes the file node06stNodeCredential1.pem from the certificates directory.
The system returns true when successfully triggered, otherwise false.
- Check that the certificate installation has been completed
successfully:
(NodeCredential=1)>show enrollmentProgress
result=SUCCESS resultInfo="installed from the certificate file"
If an error occurs during the execution of the action, attribute enrollmentProgress shows result=FAILURE and resultInfo shows the cause of the failure.

Contents
