IBM InfoSphere Streams Version 4.1.1

Verifying certificates for InfoSphere Streams users

Use this procedure to verify that the X.509 certificates that you obtained from a certificate authority (CA) can be used to authenticate InfoSphere® Streams users.

About this task

The following files are used in the procedure examples:
  • root-ca.pem: Certificate of the CA that issued the sub-ca.pem file.
  • sub-ca.pem: Certificate of the CA that issued the user.pem file.
  • user.pem: Certificate of the user that was issued by the subordinate CA.
  • crl.pem: Certificate revocation list that was generated by the subordinate CA.

Procedure

  1. Display the text data in the client certificate, for example:
    openssl x509 -noout -text -in user.pem
    Output example:
    Certificate:
              Data:
                  Version: 3 (0x2)
                  Serial Number: 4111 (0x100f)
                  Signature Algorithm: sha1WithRSAEncryption
                  Issuer: C=US, ST=MN, O=IBM, OU=Streams, CN=subCA/emailAddress=admin@example.com
                  Validity
                      Not Before: Oct 14 15:49:27 2015 GMT
                      Not After : Oct 13 15:49:27 2016 GMT
                  Subject: C=US, ST=MN, O=IBM, OU=Streams, CN=streamsuser/emailAddress=streamsuser@example.com
                  Subject Public Key Info:
                      Public Key Algorithm: rsaEncryption
                      RSA Public Key: (1024 bit)
                          Modulus (1024 bit):
                              00:a3:69:09:6a:d4:ce:5d:61:03:fa:a6:e4:4b:39:
                              ec:0c:27:c8:cd:67:1d:18:f6:b9:31:55:31:82:aa:
                              3c:ea:eb:29:1e:7d:83:2b:7b:bb:7c:3c:86:68:41:
                              f9:b1:9f:0b:c0:0c:6d:06:57:95:11:8a:55:c5:85:
                              3a:a6:65:d2:85:16:78:29:b8:59:e8:20:5e:88:ee:
                              36:09:20:da:35:82:0a:3e:3a:19:bc:d7:d9:3b:61:
                              50:04:4a:fd:f8:92:bc:a3:fb:57:fc:eb:28:f4:d1:
                              6f:10:be:32:d9:11:d6:e3:66:73:20:5f:23:86:1d:
                              6c:f5:ac:0b:7e:d3:7e:fa:5f
                          Exponent: 65537 (0x10001)
                  X509v3 extensions:
                      Netscape Comment: 
                          OpenSSL Client Certificate
                      Authority Information Access: 
                          OCSP - URI:http://example.com:9080
    
                      X509v3 Authority Key Identifier: 
                          keyid:14:3C:36:B2:49:F5:D7:55:5B:86:7F:2E:F0:DB:B5:4B:EC:0B:9D:54
                          DirName:/C=US/ST=MN/L=Rochester/O=IBM/CN=IBM/emailAddress=admin@example.com
                          serial:58
    
                      X509v3 Basic Constraints: 
                          CA:FALSE
                      X509v3 CRL Distribution Points: 
                          URI:http://example.com/crl.pem
    
                      X509v3 Key Usage: critical
                          Digital Signature
                      X509v3 Extended Key Usage: 
                          TLS Web Client Authentication
                      X509v3 Subject Key Identifier: 
                          26:A1:46:FC:07:24:90:AA:01:4F:C9:11:87:20:C2:30:DC:E6:43:D8
              Signature Algorithm: sha1WithRSAEncryption
                  b6:a1:48:1d:e1:da:91:dd:50:02:5c:58:46:12:9e:7e:a4:20:
                  09:b5:32:af:90:3b:a7:75:ee:e9:90:65:a5:3c:91:67:5f:0a:
                  98:81:13:77:15:1b:87:3c:0d:86:6c:62:8c:99:06:c8:1b:b4:
                  e7:96:12:94:2c:f8:5f:ec:0d:69:20:bc:94:3a:ce:e6:0d:5e:
                  55:6d:17:ed:54:55:25:ee:c8:85:42:87:05:ef:03:5f:04:89:
                  8f:7c:21:d9:c6:45:cd:50:18:cf:20:e1:06:8e:ae:ad:78:97:
                  f5:71:22:f7:8b:5c:df:f5:01:bf:04:47:18:ff:cc:b6:64:49:
                  46:95

  2. Display the subordinate CA certificate subject and issuer data, for example:
    openssl x509 -noout -subject -issuer -in sub-ca.pem
    Output example:
    subject= /C=US/ST=MN/O=IBM/OU=Streams/CN=subCA/emailAddress=admin@example.com
    issuer= /C=US/ST=MN/L=Rochester/O=IBM/CN=rootCA/emailAddress=admin@exmaple.com

  3. Display the root CA certificate subject and issuer data, for example:
    openssl x509 -noout -subject -issuer -in root-ca.pem
    Output example:
    subject= /C=US/ST=MN/L=Rochester/O=IBM/CN=rootCA/emailAddress=admin@example.com
    issuer= /C=US/ST=MN/L=Rochester/O=IBM/CN=rootCA/emailAddress=admin@example.com      

  4. Verify the client certificate with the trusted certificates.
    1. Create a CA chain file, for example:
      cat sub-ca.pem root-ca.pem > ca-chain.pem
    2. Verify the client certificate with the trusted certificates, for example:
      openssl verify -CAfile ca-chain.pem user.pem

  5. Verify the client revocation status with the trusted certificates, for example:
    openssl verify -crl_check -CAfile ca-chain.pem -CRLfile crl.pem user.pem