The information in this article applies to:
IMPORTANT: This article contains information about editing the registry. Before you edit the registry, make sure you understand how to restore it if a problem occurs. For information about how to do this, view the "Restoring the Registry" Help topic in Regedit.exe or the "Restoring a Registry Key" Help topic in Regedt32.exe. SUMMARY
This article describes how to enable SGC on a computer running Internet Information Server (IIS). MORE INFORMATIONInstalling Schannel.dll and Sgcinst.exe
Enabling Server Gated CryptographyWARNING: Using Registry Editor incorrectly can cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk.For information about how to edit the registry, view the "Changing Keys and Values" Help topic in Registry Editor (Regedit.exe) or the "Add and Delete Information in the Registry" and "Edit Registry Data" Help topics in Regedt32.exe. Note that you should back up the registry before you edit it. If you are running Windows NT, you should also update your Emergency Repair Disk (ERD).
Requesting an SGC CertificateAn SGC Certificate can be requested using the process described in the IIS Key Manager documentation. Generating a request for an SGC Certificate is no different than the process for requesting a standard Server Identification Certificate. Please note that the keys associated with SGC Certificates should be 1024 bits in length.Note: You will also need to provide any additional information requested by the Certificate Authority to validate your application. Installing the SGC CertificateInstalling an SGC Certificate with IIS 3.0 requires a two step process.VeriSign and other Certificate Authorities (CAs) that currently issue Server Identification Certificates return the server certificate as a base-64 encoded x.509v3 certificate. To more effectively control issuance of the SGC Certificates, VeriSign has created an intermediate, or issuing, CA for SGC Certificates. This requires a certificate chain be returned to the IIS computer. This chain includes both the SGC Server Certificate and the intermediate CA Certificate in a base-64 encoded PKCS-7 data structure. With current IIS releases, this must be pre-processed prior to installing the SGC Server Certificate using IIS Key Manager. Sgcinst.exe performs the required pre-processing. It accepts a base-64 encoded PKCS-7 data structure, installs the intermediate CA Certificate, and creates a base-64 encoded x.509v3 Certificate file containing only the SGC server Certificate. This output file may then be loaded for IIS use using Key Manager. To install a base-64 encoded PKCS-7 data structure from VeriSign or other CA returning a PKCS-7 Certificate chain, do the following:
NOTESIt is critical that the input file to the Sgcinst program is properly formatted. A properly formatted input file contains only ASCII printable characters (base-64 encoding insures this). The following is an example of a correct input file:
where the . characters indicate multiple lines similar to the second one. It is acceptable for there to be additional lines of text preceding the line containing the text "BEGIN CERTIFICATE." For example, an e-mail header preceding the certificate data will not cause a problem. If you manually save the certificate chain returned by the CA, make sure to include the lines containing "BEGIN CERTIFCATE" and "END CERTIFICATE," as indicated above. Additional query words:
Keywords : |
Last Reviewed: June 28, 1999 © 2000 Microsoft Corporation. All rights reserved. Terms of Use. |