NSS Group logo

SSH Certifier 2.0.6

 

Certificate support:  
Format(s) supported X.509v3
Extensions allowed?

Standard/private

All standard PKIX X.509v3 extension fields supported.
Multiple keys/certificates per user?

Specify Yes/No and the number allowed or �no limit�

Yes, no limit.
Can certificates be customised?

Method?

 

Both built-in default profiles and user-defined profiles can be applied to certificates either on a CA basis, user basis, or user group basis. Also, administrators can manually edit the certificates depending on the RA/CA policies. Both GUI and scripting options provided for profile template customisation.
Revocation methods:  
CRL? Yes, X.509 v2 CRL
OCSP? Yes, PKIX RFC2560 responder included.
CRT (Certificate Revocation Trees)? No.
CRL Distribution Points?

 

Yes, also multiple distribution points per certificate supported.
Scalability:  
Modularity

Brief description of architecture (i.e. CA/RA on separate machines, etc)

 

CA and RA are operated within separate Certifier installations, and the communication is based on PKIX CMPv2 protocol. Both online and offline connections between CA and RA are supported.

 

Certifier provides also modularity to distribute single CA or RA installation to separate machines so that Certifier Engine and each front-end Certifier Service (administration, web enrolment, SCEP, CMP, publishing client, enrolment client, OCSP responder) can run on separate hosts if needed. For example, Certifier Engine can run on an internal network, while front-end services are provided in the DMZ.

Installation options

 

There are separate installation packages for Certifier Engine and Certifier Server. Certifier Engine installation also performs a silent installation of Sybase Adaptive Server Anywhere database, which is used as an internal data repository. All front-end services are configured after the installation via the web-based administration interface of SSH Certifier.
Capacity

Max no. of certificates per CA

No theoretical limit.
Security:  
Communications to client

 

PKIX CMPv2, SCEP, PKCS#10/PKCS#7, Netscape Keygen, SSL, PKCS#12
Communications between CA/RA

 

PKIX CMPv2 with TCP, HTTP, and off-line transports supported
CA/RA protection (tokens, passwords, ACL�s, etc.)

 

The CA/RA administrators can be authenticated with passwords, software certificates, or hardware tokens (e.g. smart cards and USB tokens) depending on the policy. Access control for each administrator can be defined granularly. For example: read access only, certificate management for specific CA, full access etc. The actual CA/RA signing keys can be stored either in an encrypted (AES) software format or hardware security module.
Hardware protection of CA root keys?

Specify Yes/No and method

 

Yes, nCipher nForce and nShield currently supported. Generic PKCS#11 support will be available during Q1/2003.
PKI topologies:  
Cross certification methods allowed

 

Both off-line PKCS#10/PKCS#7 and online PKIX CMPv2 supported for cross-certification.
If hierarchies are allowed:  
What depth? Unlimited.
At what levels can CA�s be cross-certified? At any level, no restrictions.
Is it possible to join a hierarchy after installation to support mergers, acquisitions, or joining a trust alliance? Yes, cross certificates or new CA certificates to existing CA private key can be issued at any time during the lifecycle of the CA.
Multiple CA/RA allowed?

Specify Yes/No and the limit

Yes, no limits. Multiple virtual CA/RA within a single installation can have their separate policies, and separate administrators.
Registration mechanisms (for each, specify Yes/No, and whether out of box or via tool kits):  
Face to face Yes � out of the box.
Bulk/automated Yes � out of the box.
Web Yes � out of the box.
E-mail Yes � requires customisation using scripts.
VPN Yes � out of the box.
Other (specify)  
Device certification direct to CA or requires admin intervention? Both supported, depends on the CA policy.
Can RA interface be customised easily?

Method?

HTML registration can be freely customized, both visually and functionally. Also, versatile PKIX CMPv2 �compliant command line tools for enrolling certificates are provided for customized certificate enrolment.
Tool kits available?

 

SSH Certificate Toolkit for client-side development (PKCS#7, PKCS#8, PKCS#10, PKCS#11, PKCS#12, SCEP, PKIX CMPv2, automated X.509 certificate path construction and validation, LDAP, HTTP)
Directory support:  
Own directory only or third party?

Which third party directories?

 

All third party LDAPv2 or v3 -compliant directories supported including OpenLDAP, Sun One Directory Server, Novell eDirectory, Critical Path Directory Server, Oracle Internet Directory, Microsoft Active Directory
Own directory provided out of the box?

 

OpenLDAP installation package provided for Linux and Solaris.
Can new objects be created on the fly by the PKI?

 

Yes, publishing can be configured to update existing directory entries or create new ones on the fly. LDAP schemas can be freely defined, any naming can be used, and multiple LDAP publishing method per CA/RA are supported.
Smart card/token support:  
Which devices/standards?

 

Any PKCS#11 and MSCAPI-compliant device including Gemplus GPK, Schlumberger Cryptoflex, Aladdin eToken, and Rainbow iKey. PKCS#15-compliant ISO7816-4 smart card operating systems including Miotec MioCOS and Setec SetCOS are supported natively with PC/SC smart card reader.
Client protection?

 

Any PKCS#11 or MSCAPI-compliant private key storage supported including the pre-configured software personal security environments of Windows. SSH Accession is provided as a desktop client to be used with PKCS#15 smart cards.
CA Administrator protection?

 

Any device mentioned above with SSLv3/TLS client authentication supported in addition to passwords.
RA Administrator protection?

 

Any device mentioned above with SSLv3/TLS client authentication supported in addition to passwords.
Key management:  
Automatic key update?

 

Yes, CA/RA can be configured to automatically re-issue certificates based on signed requests (PKIX CMPv2).
Automatic key histories? Not in current version.
Key backup and recovery?

 

Not in current version - Online PKIX CMPv2-based key backup and recovery support will be available during Q1/2003.
Management interface:  
CA Administration � GUI/command line

 

Fully web-based administration GUI provided for all tasks ranging from daily certificate management to advanced CA and system configurations.
Logging/reporting

Built-in reporting or third party?

 

All CA, RA, and other system events can be logged via Linux/Unix Syslog method, Windows event monitor, or in text files. Selected events can also be monitored via the administration GUI.
Policy-based management?

 

Yes, all policies can be provided via the administration GUI.
Multiple CA administrators?

 

Yes, access control can be defined granularly on an administrator basis.
Multiple RA administrators?

 

Yes, access control can be defined granularly on an administrator basis.
Can different administrators be assigned different tasks? Yes.
Interoperability:  
Standards supported:  
CA

 

Certificate, CRL profiles: X.509v3 certificate, X.509v2 CRL

Certificate enrolment and management: PKIX CMPv2, SCEP, PKCS#10/PKCS#7

Publishing: LDAPv2 and v3, HTTP

OCSP (RFC2560)

Session encryption: TLS

Algorithms: RSA, DSA, SHA-1, DES, 3DES, AES, RC2, RC4

Other cryptographic standards: PKCS#1, PKCS#5, PKCS#8, PKCS#11, PKCS#12, PKCS#15

RA Same as for CA.
Crypto hardware

 

nCipher nForce and nShield, generic PKCS#11 support will be available during Q1/03
Directories

 

LDAPv2 and LDAPv3 supported for directory access. Any LDAP schema can be configured.
Certificate protocols X.509v3
Others TCP, IP, ODBC, HTML
Third Party Application Support  
Specify key partners or applications that support your PKI products

 

Key VPNs: Check Point, Netscreen, Cisco (IOS, PIX, VPN Client), Nokia, Microsoft, Safenet

 

Other key applications: S/MIME-compliant e-mail clients, SSLv3/TLS-compliant web browsers, Windows smart card logon, OpenSSL based applications

 

Other key partners: Netegrity (web access management), nCipher (HSM), Aladdin and Rainbow (USB tokens), Miotec and Setec (smart cards)

Is this support via generic methods or proprietary tool kits?

 

The support is achieved via standards-based interfaces and protocols. There are no proprietary interactions between SSH Certifier and applications.
Other notable points/USP�s:  
Please provide any additional information which may be pertinent

 

SSH Certifier has been selected as the reference CA/PKI implementation in the Japan Network Security Association (JNSA), which means that the participating VPN vendors test PKI-compliancy of their implementations against SSH Certifier. An extensive free PKI interoperability test site powered by SSH Certifier is provided in http://pki.ssh.com/. 

SSH Certifier is OPSEC Certified by Check Point

Click here to return to the Review
Click here to return to the Pricing Section
Click here to return to the PKI Index Section

Send mail to webmaster with questions or 
comments about this web site.

Copyright � 1991-2006 The NSS Group Ltd.
All rights reserved.