To connect and perform operations with a Security Manager CA, CA Gateway requires an administrator profile issued by the Security Manager CA. This profile must have a role with the following permissions.

Permission category

Permissions

Certificates

Administer at least one certificate category. Currently, CA Gateway supports only Enterprise certificate types.

Certificate Types

Administer at least one certificate type.

Groups

  • View
  • Administer at least one group

License Information

View

Roles

  • View
  • Administer at least one role.

Searchbases

  • View
  • Administer at least one searchbase.

Security Policy

  • Force CRLs
  • View User Policy
  • View Security Policy
  • Export Certificate Specification

User Templates

Administer at least one template

User - General

  • View

  • Add

  • Reactivate

  • Deactivate/Remove

  • Change DN

  • Modify properties

  • Revoke certificates

  • Update key pairs

  • Set for key recovery

  • Cancel key recovery

  • Modify key update options

  • View activation code

  • Reissue activation code

User - Advanced

Change user's role

Refer to the Security Manager Administration documentation for more details on role configuration.

To create a new role for the administrator profile

  1. Log in to Security Manager Administration for the Security Manager CA.
  2. In the tree view, expand Security Policy > Roles.
  3. Select Policies Roles > New to create a new role. Alternatively, you can copy the Administrator role because this role includes most of the permissions required for the new role. 
    1. Select Administrator
    2. Select Policies > Roles > Selected Role > Copy . A copy of the role appears at the bottom of the list of roles in the tree view, and the new role’s properties appear in the right pane.
  4. Click the Role tab.

    1. Into the Unique name field, enter CAGW Admin Role.

    2. In the Authorizations field, enter 1.

    3. In the User Policy drop-down list, select CAGW Admin Policy. This is the client policy you created earlier.

    4. Unselect the End User check box. This check box should already be deselected.

  5. Click the Permissions tab.
  6. Configure the permissions documented in the above table and click Apply

  7. If prompted, authorize the operation. As explained in the Security Manager Administration documentation, the operation may require more than one authorization. 

  8. A Permission Dependencies pop-up dialog may list additional permissions required for the role to function properly. Add these missing permissions to the role.