iTable of Contents1 PKI Configuration ······································································································································1-1Introduction to PKI···································································································································1-1PKI Overview···································································································································1-1PKI Terms········································································································································1-1Architecture of PKI···························································································································1-2Applications of PKI ··························································································································1-3Operation of PKI ······························································································································1-3PKI Configuration Task List ····················································································································1-4Configuring an Entity DN ························································································································1-4Configuring a PKI Domain ······················································································································1-6Submitting a PKI Certificate Request······································································································1-7Submitting a Certificate Request in Auto Mode ··············································································1-7Submitting a Certificate Request in Manual Mode ··········································································1-8Retrieving a Certificate Manually ············································································································1-9Configuring PKI Certificate Verification·································································································1-10Destroying a Local RSA Key Pair ·········································································································1-11Deleting a Certificate·····························································································································1-11Configuring an Access Control Policy···································································································1-12Displaying and Maintaining PKI ············································································································1-12PKI Configuration Examples ·················································································································1-13Requesting a Certificate from a CA Running RSA Keon ······························································1-13Requesting a Certificate from a CA Running Windows 2003 Server············································1-16Troubleshooting PKI······························································································································1-19Failed to Retrieve a CA Certificate ································································································1-19Failed to Request a Local Certificate ····························································································1-20Failed to Retrieve CRLs ················································································································1-20