User's Manual

Field Description
SCEP & EST
Server
To enable access to the SCEP and EST servers, select this check box. The form expands to
include SCEP and EST server configuration options.
SCEP URL Shows the SCEP URL for this SCEP server.
EST URL Shows the EST URL for this SCEP server.
SCEP & EST
Secret
Enter the shared secret that SCEP and EST clients must supply.
Allowed
Access
Enter the IP addresses and networks from which logins are permitted.
Denied
Access
Enter IP addresses and networks that are denied login access.
Identity The information in these fields cannot be edited after creation.
Private Key
Self-Signed
Certificate
When you are done, click Edit Certificate Authority to complete your changes.
Requesting a Certificate for the Certificate Authority
The Intermediate Certificate Request page displays the certificate signing request for the certificate authority’s
intermediate certificate.
You can copy the certificate signing request in text format using your Web browser. Use this option when you
can paste the request directly into another application to obtain a certificate.
You can click the Download the current CSR link to download the certificate signing request as a file. Use
this option when you need to provide the certificate signing request as a file to obtain a certificate.
After you have obtained the certificate, click the Install a signed certificate link to continue configuring
the intermediate certificate authority. See "Installing a Certificate Authority’s Certificate " on page 105.
You can also click the Change CA settings link to return to the main Certificate Authority Settings form.
Use this option to switch to a root CA, or to change the name or properties of the intermediate CA and reissue
the certificate signing request.
Installing a Certificate Authority’s Certificate
You can import a private key and certificate pair to use for the root certificate or intermediate certificate. The
CA Certificate Import page may be used to:
l Upload a certificate that has been issued by another certificate authority. This process is required when
configuring an intermediate certificate authority.
n A private key is not required, as the certificate authority has already generated one and used it to create
the certificate signing request.
l Upload a certificate and private key to be used as the certificate authority’s certificate. This process may be
used to configure a root certificate authority.
n A private key is required, as the certificate authority’s existing private key will be replaced.
Dell Networking W-ClearPass Guest 6.4 | User Guide Onboard | 105