OpenCA

OpenCA, officially the OpenCA PKI Research Labs and formerly the OpenCA Project, is a PKI collaborative effort to develop a robust, full-featured and open-source out-of-the-box certification authority implementing the most used protocols with full-strength cryptography. OpenCA is based on many open-source projects; among these are OpenLDAP, OpenSSL and Apache projects.

OpenCA
Developer(s)OpenCA Labs
Stable release
v1.5.2[1] / May 10, 2014 (2014-05-10)
Operating systemMulti-platform
TypePKI Software
LicenseGNU General Public License
Websitehttps://www.openca.org/

Project development is divided into 2 main tasks: studying and refining the security scheme that guarantees the best model to be used in a certificate authority, and developing software to easily set up and manage a CA.

The software development side of the project is further divided into the following sub-projects:

  • OpenCA PKI, a full-featured PKI package.
  • LibPKI, a library for PKI application development.
  • OpenCA OCSPD, a small, robust Online Certificate Status Protocol daemon.
  • PRQPD Server, a PKI Resource Query Protocol daemon for use in conjunction with the PKI package.
  • OpenCA-ng, a next-generation project planned to implement new features and overcome limitations of the current project.

OpenCA PKI

The problem with Public Key Infrastructures (PKIs) is that most applications can be secured with certificates and keys but it is difficult and sometimes expensive to set up PKIs, because flexible trustcenter software is expensive.

OpenCA started in 1999. The first idea consisted of three major parts - a Perl web interface, an OpenSSL backend for the cryptographic operation and a database. This simple concept is still developers motto today. Nearly all operations can be performed via some web interface. It has six preconfigured interfaces and many more can be created from them, depending on the need. The cryptographic backend is OpenSSL, which is in no way a disadvantage. OpenCA is aimed to build the organizational infrastructure for a PKI. OpenCA's databases store all the needed information about the users' cryptographic objects like Certificate Signing Requests (CSRs), Certificates, Certificate Revocation Requests (CRRs) and Certificate Revocation Lists (CRLs).

OpenCA PKI Features

Today OpenCa supports the following elements: (this is an incomplete list just to give you an impression of how complex the subject matter is):

  • Public interface
  • LDAP interface
  • RA interface
  • CA interface
  • SCEP
  • OCSP
  • IP-filters for interfaces
  • Passphrase based login
  • Certificate based login (including smartcards)
  • Role Based Access Control
  • Flexible Certificate Subjects
  • Flexible Certificate Extensions
  • PIN based revocation
  • Digital signature based revocation
  • CRL issuing
  • Warnings for soon to expire certificates
  • support for nearly every (graphical) browser

OpenCA is designed for a distributed infrastructure. It can, not only handle an offline CA and an online RA, but using it you can build a whole hierarchy with three or more levels. OpenCA is not just a small solution for small and medium research facilities. The goal is to support maximum flexibility for big organizations like universities, grids and global companies.

gollark: ?
gollark: (I finally made my GPU-accelerated fan noise generator™ work)
gollark: ↓ firecubez, not making macron
gollark: ↓ firecubez, when making macron
gollark: They effectively get accelerated aging due to ??? telomeres, if I remember right.

See also

References


This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.