How to generate a vettor certificate from a PKCS#10 (CSR) request
Originally Published: 2015-06-05
Article Number
Applies To
RSA Product/Service Type: RSA Certificate Manager
RSA Version: 6.9
Issue
Tasks
1. Before proceeding with the procedure below, make a full backup of your RCM installation. The steps include manually modifying the request object in RCM database.
2. Generate a keypair protected by HSM, and create a PKCS#10 / CSR using HSM provided tools.
3. Submit the PKCS#10 request to any available jurisdiction on RCM Enrollment Server.
(Note that Administrative CA jurisdiction is NOT listed on the Enrollment Server request page so the PKCS#10 request cannot be submitted directly to Administrative CA. Vettor certificates are issued by Administrative CA.)
4. Make a note of Admin CA jurisdiction’s ID and Admin CA’s MD5. Those ID’s can be obtained by viewing the Admin CA and its jurisdiction through CA Operations workbench.
(For example, the steps below assume that the Admin CA jurisdiction ID is 7aefd4f9d0f842ce82e137003c48c997e8e7fb0c, and the Admin CA MD5 is 1c2bf6347137826634e2aba4486947e3.)
5. Update the recently submit request object in RCM db so that (i) the request belongs to the Admin CA jurisdiction (instead of the jurisdiction it was originally submitted to), and (ii) the request type is changed to make it a vettor request.
a. Use listuclass.xuda tool to view the request object. Go to https://<RCM-hostname>:444/ca/admin/listuclass.xuda, click on ‘list’ against xuda_cert_req, look up the recently submitted request in the list (usually latest request shows at the bottom of the list), click ‘edit’ against the request submitted in step 3.
(For example, the request DN may look like: “req-id=C0A816830000027C0000000700000001, dn=request_queue”)
b. Update DOMAINID attribute to that of Admin CA jurisdiction ID.
(For example, using sample values in step 4, replace the DOMAINID value with 7aefd4f9d0f842ce82e137003c48c997e8e7fb0c.)
c. Update ISSUER-CA-MD5 attribute to that of Admin CA MD5.
(For example, using sample values in step 4, replace the ISSUER-CA-MD5 value with 1c2bf6347137826634e2aba4486947e3.)
d. Update ADMIN-TYPE attribute to add the value “vettor” (without enclosing quotes), so the request is marked as a vettor request.
e. Click ‘REPLACE Object’ button at the bottom of the page, to commit the changes to db.
(For example, the request DN may look like: “req-id=C0A816830000027C0000000700000001, dn=request_queue”)
b. Update DOMAINID attribute to that of Admin CA jurisdiction ID.
(For example, using sample values in step 4, replace the DOMAINID value with 7aefd4f9d0f842ce82e137003c48c997e8e7fb0c.)
c. Update ISSUER-CA-MD5 attribute to that of Admin CA MD5.
(For example, using sample values in step 4, replace the ISSUER-CA-MD5 value with 1c2bf6347137826634e2aba4486947e3.)
d. Update ADMIN-TYPE attribute to add the value “vettor” (without enclosing quotes), so the request is marked as a vettor request.
e. Click ‘REPLACE Object’ button at the bottom of the page, to commit the changes to db.
6. Go to Administrator Operations workbench, select ‘request-active’ under ‘Vettor’ section. The recently submitted request that was tweaked through listuclass.xuda tool, should show up on the page. Click on the request, and approve to generate the vettor certificate.
Notes
Related Articles
Single quote character ' in CN breaks JavaScript code when using RSA Certificate Manager 20Number of Views Obtain Trace Data for ACE/Server 5.x 20Number of Views XudaInstanceOf failed to get xuda_cert_req object! result = 48 11Number of Views Program Error: 'req-authorize.xuda: Line 518: [XrcNOTFOUND] unable to locate requested member or object. Unable to sign ce… 18Number of Views How to generate a Certificate Signing Request (CSR) with the Subject Alternative Name (SAN) field using openssl on RSA Aut… 477Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.9 Release Notes (January 2026) An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA Authentication Manager 8.8 Setup and Configuration Guide
Don't see what you're looking for?