Skip to main content
Skip table of contents

Root CA

Introduction

Create CA Hierarchy Lab Overview - PART 1, Create the Root CA

Slide Deck: Create CA Hierarchy

Overview: This lab is used to create our EJBCA PKI Hierarchy lab environment, which will be used throughout this course. The Root CA is our trust-anchor, and becomes the point of trust for the PKI. This CA is brought online and used to build out the rest of the PKI. Once the hierarchy is created, the Root is normally brought offline - this of course all depends on the organizations policies regarding its PKI infrastructure.

The Create CA Hierarchy, consists of three parts; creating a Root CA, a Subordinate CA, and an External Subordinate CA.

  1. The first part of this lab focuses on creating the Root CA. This part consists of three steps.

    1. Create a Crypto Token which allows EJBCA to access the Root CA keys.

    2. Clone the Root certificate profile, which is provided as a template with EJBCA, and make modifications required for the lab environment i.e. select key algorithm, and key length etc.

    3. Creating the Root CA, by making modifications specific for the Root CA, adding any asserted information, i.e. DN of the CA, assign the crypto keys to their usage, and configure CRL validity periods.

Slide Reference

Create the crypto token first

Next create the certificate authority

Create Root CA Crypto Token

Open a browser and go to the CA URL https://ca.keyfactor.training/ejbca/adminweb to access Admin Web

  1. Click CA Functions >> Crypto Tokens

  2. Click Create new

  3. In the Name field, enter rootcacryptotoken

  4. In the Type list, select PKCS#11 NG

  5. In the PKCS#11 Reference Type list, select Slot/Token Label

  6. In the PKCS#11 Reference list, select ROOT_CA_SLOT

  7. In the Authentication Code field, enter the password for the slot (password on the training system is foo123)

  8. In the Repeat Authentication Code field, re-enter the password from previous step

  9. Click Save

  10. Enter signKey00001 as the name for the new key, choose RSA 4096 from the list, select Sign and Encrypt for key usage and click Generate new key pair

  11. Click Test for the new key created, the result should be signKey00001 tested successfully

  12. Enter defaultKey00001 as the name for the new key, choose RSA 4096 from the list, select Sign and Encrypt for key usage and click Generate new key pair

  13. Click Test for the new key created, the result should be defaultKey00001 tested successfully

  14. Enter testKey as the name for the new key, choose RSA 1024 from the list, select Sign and Encrypt for key usage and click Generate new key pair

  15. Click Test for the new key created, the result should be testKey tested successfully

Create Root CA Certificate Profile

  1. Click CA Functions >> Certificate Profiles

  2. On ROOTCA click Clone

  3. Enter RootCACertificateProfile and click Create from template

  4. Click Edit on the profile RootCACertificateProfile

  5. In the Available key algorithms list, select RSA

  6. In the Available bit lengths list, select 4096 bits

  7. In the Signature Algorithm list, select SHA256WithRSA

  8. In the Validity or end date of the certificate field, enter 20y 6mo

  9. Uncheck the Use checkbox for Authority Key ID

  10. Uncheck the Use… checkbox for Subject Alternative Name

  11. Uncheck the Use… checkbox for Issuer Alternative Name

  12. Uncheck the Use checkbox for LDAP DN order

  13. Keep the other values as default

  14. Click Save

Create Root CA

  1. Click CA Functions >> Certification Authorities

  2. In the Add CA field, enter Root CA and click Create

  3. In the Crypto Token list, select rootcacryptotoken

  4. In the defaultKey list, select defaultKey00001

  5. In the certSignKey list, select signKey00001

  6. In the testKey list, select testKey

  7. In the Subject DN field, enter CN=Root CA, O=PrimeKey Solutions AB, C=SE

  8. In the Certificate Profile list, select RootCACertificateProfile

  9. In the Validity (*y *mo *d *h *m *s) or end date of the certificate field, enter 20y 6mo

  10. Uncheck the checkbox for LDAP DN Order

  11. In the CRL Expire Period field, enter 2d

  12. In the CRL Issue Interval field, enter 1d

  13. In the CRL Overlap Time field, enter 0m

  14. In the Monitor if CA active (healthcheck), check Activate

  15. Click Create

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.