Add Subordinate CA Providers
Focus
Focus
Next‑Gen Trust Security

Add Subordinate CA Providers

Table of Contents

Add Subordinate CA Providers

Subordinate CA providers define the properties of Distributed Issuer's CA certificates—such as validity period, key algorithm, and subject fields—and link them to the CA accounts that sign them. Distributed Issuer signs workload certificates with these CA certificates, establishing a chain of trust.
Create multiple subordinate CA providers when you're using more than one CA account or different certificate templates for the same CA.

Prerequisites

Before you add a subordinate CA provider, make sure you have:
  • A parent Tenant Service Group account, to share resources with child tenants.
  • In Next-Gen Trust Security, a Superuser user role.
  • At least one CA Account.
  • If planning to use a signing key in a hardware security module (HSM):
    • The HSM slot and PIN.
    • (Optional) The checksums for the client libraries that Distributed Issuer can use.

To Add a Subordinate CA Provider

  1. Sign in to Next-Gen Trust Security.
  2. Click Configuration > Issuer Sub CA Providers.
  3. Click New and select a CA type.
  4. Enter the following information.
    FieldDescription
    NameName of the subordinate CA provider; appears on the Issuer Sub CA Providers page.
    CA AccountSelect an existing CA account. If the account you need isn't listed, create a new CA account first.
    Issuer Cert ValidityThe validity period of Distributed Issuer's CA certificate. This should be at least as long as the validity period of any certificate Distributed Issuer will issue to its clients. Type in the value, then select a unit.
  5. (Optional) To use an HSM for Distributed Issuer's signing key, enable Require HSM and enter the following information.
    FieldDescription
    Partition labelIdentifies the specific logical subdivision of an HSM that stores an application's cryptographic keys.
    Partition Serial NumberProvides a unique, permanent numeric identifier for a specific subdivision within an HSM.
    PINEnter the PIN required to access the HSM. Consult the vendor documentation for the required format of the PIN.
    Allowed Client Libraries(Optional) Specify the SHA-256 checksum of the PKCS#11 library Distributed Issuer is allowed to use. This ensures Distributed Issuer is connected to the correct client. If nothing is entered here, Distributed Issuer could use any PKCS#11 library, which could be a potential security risk.
  6. Under CSR Parameters, enter the certificate subject fields.
    FieldDescription
    Common NameSuffix that gets appended to the instanceNaming value in the config.yaml file, which becomes the common name of the CA certificate for Distributed Issuer.
    Organization(Optional) Your organization's legal name helps your users verify that they can trust Distributed Issuer's certificate.
    Organizational Unit(Optional) The division of your organization that is managing the certificate.
    City/Locality(Optional) The city or locality of your organization.
    State/Province(Optional) The state or province of your organization.
    Country(Optional) The country of your organization.
    Key AlgorithmThe algorithm and key size (or curve) for the keypair Distributed Issuer will generate when it starts.
  7. Under Resource Consumers, choose which Tenant Service Groups can use this policy. Toggle Allow everyone to consume or select specific child tenants from the list.
  8. Click Create.

What's Next?

Now that you have created a subordinate CA provider, create a policy that sets rules for the certificates that Distributed Issuer issues to workloads.