XiPKI (eXtensible sImple Public Key Infrastructure) is a highly scalable and high-performance open source PKI (CA and OCSP responder).
- The Apache Software License, Version 2.0
Lijun Liao, LinkedIn
Just create issues.
- OS: Linux, Windows, MacOS
- JRE / JDK 8 (build 162 ), 9, 10, 11
- Database: DB2, MariaDB, MySQL, Oracle, PostgreSQL
- Softhsm v1 & v2,
- Smartcard HSM EA ,
- Thales nCipher Connect, Thales nCipher Solo, Utimaco Se
Set the environment variable JAVA_HOME
to point to root directory of the to
the JRE/JDK installation.
Download the binaries ca-war-<version>.zip
, ocsp-war-<version>.zip
and
xipki-cli-<version>.tar.gz
from
releases.
Only if you want to use the development version, build it from source code as follows.
-
Get a copy of project code
git clone https://github.com/xipki/xipki
-
Build the project
In folder
xipki
mvn clean install -DskipTests
Then you will find the following binaries:
- CA:
assembles/ca-war/target/ca-war-<version>.zip
- OCSP:
assembles/ocsp-war/target/ocsp-war-<version>.zip
- CLI (Command Line Interface):
assembles/xipki-cli/target/xipki-cli-<version>.tar.gz
- CA:
-
Unpack the binary
ca-war-<version>.zip
and install CA as described in the unpacked README file. -
Adapt the database configurations ${CONTAINER_ROOT}/xipki/etc/ca/database/{ca|ocsp}-db.properties.
- If you use database other than MariaDB and MySQL, you need to overwrite the configuration templates from the sub folder.
- If you use database other than MariaDB, MySQL and PostgreSQL, you need to get the JDBC driver and copy
it to the container directory for external jars (e.g.
lib
in tomcat, andlib/ext
in jetty).
-
Create new databases configured in Step 2.
-
Initialize the databases configured in Step 2.
ca-war-<version>/dbtool/bin/initdb.sh \
--db-conf xipki/etc/ca/database/{ca|ocsp}-db.properties \
--db-schema xipki/sql/{ca|ocsp}-init.xml
Note that CA and OCSP can be installed in the same servlet container.
-
Unpack the binary
ocsp-war-<version>.zip
and install OCSP responder as described in the unpacked README file. -
Adapt the database configuration ${CONTAINER_ROOT}/xipki/etc/ocsp/database/ocsp-db.properties.
- If you use database other than MariaDB and MySQL, you need to overwrite the configuration templates from the sub folder.
- If you use database other than MariaDB, MySQL and PostgreSQL, you need to get the JDBC drivers and copy
it to the container directory for external jars (e.g.
lib
in tomcat, andlib/ext
in jetty).
- Unpack the binary
xipki-cli-<version>.tar.gz
- Adapt the CMP client configuration
xipki/cmpclient/cmpclient.json
This step is only required if the real PKCS#11 device instead of the emulator is used.
- Copy
xipki/security/example/pkcs11-hsm.json
toxipki/security/pkcs11.json
, and adapt the PKCS#11 configuration.
This step is only required if the CA is behind a reverse proxy apache httpd.
-
Add the java property org.xipki.reverseproxy.mode
-Dorg.xipki.reverseproxy.mode=APACHE
-
configure the proxy to forward the headers via mod_proxy with the following configuration
RequestHeader set SSL_CLIENT_VERIFY "%{SSL_CLIENT_VERIFY}s" RequestHeader set SSL_CLIENT_CERT "%{SSL_CLIENT_CERT}s"
For more details please refer to
- Start the servlet container
HSM devices of Thales, e.g. nCipher, can use Thales preload to manage the PKCS#11 sessions. In this case, the servlet container should be started as follows
preload <start script>
- Setup CA in CLI
-
Start CLI.
bin/karaf
-
Setup CA
-
In case of using new keys and certificates, in CLI:
source xipki/setup/cacert-none/setup-*.script
where * is place holder. -
In case of using existing keys and certificates, in CLI:
source xipki/setup/cacert-present/setup-*.script
where * is place holder.
-
-
Verify the installation, execute the command in CLI:
ca-info myca1
-
-
The following shell script demonstrates how to enroll and revoke certificates, and how to get the current CRL:
<CLI_ROOT>/xipki/client-script/rest.sh
Note that this script tells CA to generate real certificates. DO NOT use it in the production environment.
-
SCEP
Using any SCEP client. XiPKI provides also a SCEP client.The binary
xipki-cli-<version>
.tar.gz contains an example script in the folder xipki/client-script. It can be executed in the CLI as follows:source xipki/client-script/scep-client.script
-
XiPKI CLI XiPKI CLI provides both the full-featured client and the lite version to enroll and revoke certificates via CMP.
The binary
xipki-cli-<version>
.tar.gz contains an example script in the folder xipki/client-script. It can be executed in the CLI as follows:source xipki/client-script/cmp-client.script
-
REST API
The shell scriptxipki/client-script/rest.sh
of thexipki-cli
demonstrates the use of REST API.The binary
xipki-cli-<version>
.tar.gz contains an example script in the folder xipki/client-script. It can be executed in the CLI as follows:source xipki/client-script/rest-client.script
Please refer to commands.md for more details.
-
CA (Certification Authority)
- X.509 Certificate v3 (RFC 5280)
- X.509 CRL v2 (RFC 5280)
- SCEP (draft-gutmann-scep-00, draft-nourse-scep-23)
- EN 319 411 (eIDAS)
- EN 319 412 (eIDAS)
- Supported databases: DB2, MariaDB, MySQL, Oracle
- Direct and indirect CRL
- FullCRL and DeltaCRL
- Customized extension to embed certificates in CRL
- CMP (RFC 4210 and RFC 4211)
- API to specify customized certificate profiles
- Support of XML-based certificate profile
- API to specify customized publisher, e.g. for LDAP and OCSP responder
- Support of publisher for OCSP responder
- Signature algorithms of certificates
- SM3withSM2
- SHA3-*withRSA: where * is 224, 256, 384 and 512
- SHA3-*withRSAandMGF1: where * is 224, 256, 384 and 512
- SHA3-*withECDSA: where * is 224, 256, 384 and 512
- SHA3-*withDSA: where * is 224, 256, 384 and 512
- SHA*withRSA: where * is 1, 224, 256, 384 and 512
- SHA*withRSAandMGF1: where * is 1, 224, 256, 384 and 512
- SHA*withECDSA: where * is 1, 224, 256, 384 and 512
- SHA*withPlainECDSA: where * is 1, 224, 256, 384 and 512
- SHA*withDSA: where * is 1, 224, 256, 384 and 512
-
Native support of X.509 extensions (other extensions can be supported by configuring it as blob)
- AdditionalInformation (German national standard CommonPKI)
- Admission (German national standard CommonPKI)
- AuthorityInformationAccess (RFC 5280)
- AuthorityKeyIdentifier (RFC 5280)
- BasicConstraints (RFC 5280)
- BiometricInfo (RFC 3739)
- CertificatePolicies (RFC 5280)
- CRLDistributionPoints (RFC 5280)
- ExtendedKeyUsage (RFC 5280)
- FreshestCRL (RFC 5280)
- InhibitAnyPolicy (RFC 5280)
- IssuerAltName (RFC 5280)
- KeyUsage (RFC 5280)
- NameConstraints (RFC 5280)
- OcspNoCheck (RFC 6960)
- PolicyConstrains (RFC 5280)
- PolicyMappings (RFC 5280)
- PrivateKeyUsagePeriod (RFC 5280)
- QCStatements (RFC 3739, eIDAS standard EN 319 412)
- Restriction (German national standard CommonPKI)
- SMIMECapabilities (RFC 4262)
- SubjectAltName (RFC 5280)
- SubjectDirectoryAttributes (RFC 3739)
- SubjectInfoAccess (RFC 5280)
- SubjectKeyIdentifier (RFC 5280)
- TLSFeature (RFC 7633)
- ValidityModel (German national standard CommonPKI)
-
Management of multiple CAs in one software instance
-
Support of database cluster
-
Multiple software instances (all can be in active mode) for the same CA
-
Native support of management of CA via embedded OSGi commands
-
API to specify CA management, e.g. GUI
-
Database tool (export and import CA database) simplifies the switch of databases, upgrade of XiPKi and switch from other CA system to XiPKI CA
-
Client to enroll, revoke, unrevoke and remove certificates, to generate and download CRLs
-
All configuration of CA except those of databases is saved in database
-
OCSP Responder
- OCSP Responder (RFC 2560 and RFC 6960)
- Support of Common PKI 2.0
- Management of multiple certificate status sources
- Support of certificate status source published by XiPKI CA
- Support of certificate status source CRL and DeltaCRL
- API to support proprietary certificate sources
- Support of both unsigned and signed OCSP requests
- Multiple software instances (all can be in active mode) for the same OCSP signer and certificate status sources.
- Supported databases: DB2, MariaDB, MySQL, Oracle
- Database tool (export and import OCSP database) simplifies the switch of databases, upgrade of XiPKi and switch from other OCSP system to XiPKI OCSP.
- Client to send OCSP request
-
SCEP
- Supported SCEP versions
- draft-gutmann-scep-00
- draft-nourse-scep-23
- Supported SCEP versions
-
Toolkit (for both PKCS#12 and PKCS#11 tokens)
- Generating keypairs of RSA, EC and DSA in token
- Deleting keypairs and certificates from token
- Updating certificates in token
- Generating CSR (PKCS#10 request)
- Exporting certificate from token
-
For both CA and OCSP Responder
- Support of PKCS#12 and JKS keystore
- Support of PKCS#11 devices, e.g. HSM
- API to use customized key types, e.g. smartcard
- High performance
- OSGi-based (java), OS independent
- Support of health check
- Audit with syslog and slf4j
-
For CA, OCSP Responder and Toolkit
- API to resolve password
- Support of PBE (password based encryption) password resolver
- All passwords can be encrypted by the master password
- Support of OBF (as in jetty) password resolver