mirror of
https://github.com/hsnodgrass/snmp_mib_archive.git
synced 2025-04-17 16:03:04 +00:00
1223 lines
48 KiB
Plaintext
1223 lines
48 KiB
Plaintext
-- *********************************************************************
|
|
-- CISCO-PKI-PARTICIPATION-MIB.my: Cisco Public Key Infrastructure
|
|
-- Participation MIB
|
|
--
|
|
-- May 2005, Ramachandran V R
|
|
--
|
|
-- Copyright (c) 2005 by cisco Systems, Inc.
|
|
-- All rights reserved.
|
|
--
|
|
-- *********************************************************************
|
|
|
|
CISCO-PKI-PARTICIPATION-MIB DEFINITIONS ::= BEGIN
|
|
|
|
IMPORTS
|
|
MODULE-IDENTITY,
|
|
OBJECT-TYPE,
|
|
Unsigned32
|
|
FROM SNMPv2-SMI
|
|
MODULE-COMPLIANCE,
|
|
OBJECT-GROUP
|
|
FROM SNMPv2-CONF
|
|
TEXTUAL-CONVENTION,
|
|
DateAndTime, TruthValue, StorageType, RowStatus
|
|
FROM SNMPv2-TC
|
|
SnmpAdminString
|
|
FROM SNMP-FRAMEWORK-MIB
|
|
ciscoMgmt
|
|
FROM CISCO-SMI;
|
|
|
|
cpkiMIB MODULE-IDENTITY
|
|
LAST-UPDATED "200510220000Z"
|
|
ORGANIZATION "Cisco Systems, Inc."
|
|
CONTACT-INFO
|
|
" Cisco Systems
|
|
Network Management Technology Group
|
|
|
|
Postal: 170 W Tasman Drive
|
|
San Jose, CA 95134
|
|
USA
|
|
|
|
Tel: +1 800 553-NETS
|
|
|
|
E-mail: cs-san@cisco.com"
|
|
DESCRIPTION
|
|
"A networking device may provide several security services
|
|
and protocols like SSL, SSH, IPSec/IKE etc. which need
|
|
identities in the form of X509 certificates. The device
|
|
uses these certificates (called identity certificates) to
|
|
authenticate itself to various clients communicating with
|
|
the device using these protocols and also to provide other
|
|
protection for the communication like confidentiality,
|
|
integrity and non-repudiation. In addition, the device may
|
|
need to authenticate the clients which involves, among
|
|
other things, verifying the certificates presented by the
|
|
clients (peer certificates) during the protocol exchanges.
|
|
The certificate verification, in turn, involves the
|
|
certificate revocation status checking and the certificate
|
|
signature verification. This MIB applies to the public key
|
|
infrastructure (PKI) participation feature which enables a
|
|
networking device to participate in one or more PKI
|
|
services (also called Certificate Authorities) enabling
|
|
it to obtain one or more X509 identity certificates for
|
|
its own use as well as to verify peer certificates.
|
|
|
|
This MIB organizes the various certificates, key-pairs and
|
|
Certificate Authority related information into the tables:
|
|
the trustpoint table for certificate and CA information
|
|
and a key-pair table for the key-pair information for each
|
|
type of key-pair such as RSA, DSA etc. An entry in the
|
|
trustpoint table corresponds to a trusted CA for obtaining
|
|
an identity certificate from and also for verifying the
|
|
peer certificates issued by that CA. The entry contains
|
|
information about the CA certificate, the identity
|
|
certificate - if obtained - from the CA, the corresponding
|
|
key-pair from a key-pair table (for which the identity
|
|
certificate was obtained) and the information needed for
|
|
revocation checking of certitifates issued by the CA.
|
|
|
|
For each type (RSA, DSA etc.) of key-pair supported by the
|
|
device, a key-pair table is present and contains an entry
|
|
for each key-pair of that type present in the device. This
|
|
allows future expansion of the MIB to support additional
|
|
key-pair types (currently only RSA key-pair is supported).
|
|
|
|
As seen above, a key-pair entry from a key-pair table can
|
|
be associated to an entry in the trustpoint table. A key-
|
|
pair entry can be associated to multiple trustpoint table
|
|
entries but not vice versa.
|
|
|
|
This MIB supports the certificate work-flow operations,
|
|
generally used for generating the key-pairs and obtaining
|
|
the certificates for them from various CAs. The following
|
|
are the steps in one typical work-flow:
|
|
|
|
1. create a trustpoint (an entry in trustpoint table) in
|
|
the device.
|
|
2. Authenticate a CA (this involves manually verifying the
|
|
CA certificate/chain fingerprints and then inputing the
|
|
CA certificate/chain into the trustpoint).
|
|
3. Generate a key-pair (an entry in key-pair table).
|
|
4. Associate the key-pair to the trustpoint.
|
|
5. Generate a pkcs#10 Certificate Signing Request (CSR) in
|
|
the trustpoint.
|
|
7. Submit CSR to the CA and get the identity certificate.
|
|
9. Input the identity certificate into the trustpoint.
|
|
|
|
In another typical certificate work-flow, the key-pair and
|
|
the corresponding identity certificate are allowed to be
|
|
generated/obtained outside the device by whatever means
|
|
and then input to the device in the pkcs#12 form.
|
|
|
|
This MIB does not support the configuration of individual
|
|
security services like SSL, SSH, IPsec/IKE etc. to use
|
|
particular trustpoints or certificates and key-pairs in
|
|
them. Instead the security services certificate usage
|
|
configuration is supported in the respective feature MIBs.
|
|
|
|
|
|
Glossary of the terms used in this MIB:
|
|
--------------------------------------
|
|
key-pair -
|
|
A pair of public-key cryptographic keys in which one is
|
|
public and the other private.
|
|
RSA key-pair -
|
|
A key-pair belonging to the RSA public-key cryptography
|
|
algorithm.
|
|
Certificate Authority (CA) -
|
|
A service which issues X509 certificates to certify the
|
|
identity (name) and public-key of end entities.
|
|
X509 -
|
|
A standard for certificates and CRLs.
|
|
Reference: RFC 2459.
|
|
CA certificate -
|
|
The self-signed certificate of a CA certifying its own
|
|
identity and public-key.
|
|
CA certificate chain -
|
|
If a CA is certified by another CA which, in turn, was
|
|
certified by a third CA and so on, ending in a CA which
|
|
is self-certified, the original CA is said to be a
|
|
subordinate CA and its CA certificate is a chain which
|
|
is the set of CA certificates of all CAs involved.
|
|
Identity certificate -
|
|
The certificate of a device issued by a CA in which the
|
|
device identity and public-key are certified.
|
|
Trustpoint -
|
|
The various information about a CA (including its CA
|
|
certificate/chain), which the device wants to trust so
|
|
that it can use it to enroll with the CA to g et an
|
|
identity certificate and/or use it to verify the peer
|
|
certificates issed by the CA.
|
|
Certificate fingerptint -
|
|
The digest of a certificate computed using MD5 or SHA
|
|
hash algorithm.
|
|
CA authentication -
|
|
The process of configuring the CA certificate/chain for
|
|
a trustpoint. The process involves calculating the
|
|
fingerprints of the CA certificates and verifying them
|
|
against the same already published by the CAs.
|
|
Enrollment -
|
|
The process of creating a Certificate Signing Request in
|
|
a trustpoint, submitting it to corresponding CA, getting
|
|
back the identity certificate and inputing it into the
|
|
trustpoint.
|
|
Certificate verification -
|
|
The process of verifying the signature on a certificate
|
|
to see if it was really signed by the CA who issued it.
|
|
This verification process uses the CA certificate/chain.
|
|
The certificate verification also involves verifying the
|
|
validity of certificate with respect to current time by
|
|
checking against the validity interval given in the
|
|
certificate and the revocation status of the certificate
|
|
as maintained by the CA.
|
|
Certificate Signing Request (CSR) -
|
|
A request to a CA for signing a certificate of an entity.
|
|
The request contains the public key, the name and other
|
|
attributes of the entity.
|
|
pkcs#10 -
|
|
A standard syntax for the CSR, Reference: RFC 2986.
|
|
pkcs#12 -
|
|
A standard for exporting and importing a certificate
|
|
along with associated key-pair and CA certificate/chain.
|
|
Reference: PKCS #12 v1.0: Personal Information Exchange
|
|
Syntax Standard, RSA Laboratories, June 24, 1999
|
|
CRL -
|
|
Certificate Revocation List, a list of certificates that
|
|
are revoked, as maintained by a CA.
|
|
OCSP -
|
|
Online Certificate Staus Protocol, a protocol for online
|
|
checking of the revocation status of certificates.
|
|
PEM format -
|
|
A printable text encoding format for certificates,
|
|
key-pairs and CRLs, as employed by the Privacy Enhanced
|
|
Mail standard. Reference: RFCs 1421-1424.
|
|
"
|
|
|
|
REVISION "200510220000Z"
|
|
DESCRIPTION
|
|
"Initial version."
|
|
|
|
::= { ciscoMgmt 505 }
|
|
|
|
--
|
|
-- Objects, Notifications & Conformances
|
|
--
|
|
|
|
cpkiMIBNotifs OBJECT IDENTIFIER
|
|
::= { cpkiMIB 0 }
|
|
cpkiMIBObjects OBJECT IDENTIFIER
|
|
::= { cpkiMIB 1 }
|
|
cpkiMIBConform OBJECT IDENTIFIER
|
|
::= { cpkiMIB 2 }
|
|
cpkiConfig OBJECT IDENTIFIER
|
|
::= { cpkiMIBObjects 1 }
|
|
|
|
--
|
|
-- Textual Conventions
|
|
--
|
|
CiscoPkiAction ::= TEXTUAL-CONVENTION
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The PKI Support Actions for performing the certificate
|
|
work-flow operations.
|
|
|
|
'noop' - No operation
|
|
|
|
'caauth' - Certificate Authority (CA) authentication.
|
|
This operation is provided to authenticate
|
|
a CA and install its CA certificate/chain
|
|
in a trustpoint This action needs to be
|
|
followed up with the 'certconfirm' or
|
|
'certnoconfirm' action explained below.
|
|
|
|
|
|
'cadelete' - CA Certificate/chain deletion. This
|
|
operation is provided to delete the CA
|
|
certificate/chain from a trustpoint.
|
|
|
|
'certreq' - Identity certificate Request creation. This
|
|
operation is provided to generate a pkcs#10
|
|
format certificate request needed to obtain
|
|
an identity certificate from a CA.
|
|
|
|
'certimport' - Identity certificate import. This
|
|
operation is provided to install an
|
|
identity certificate obtained from a CA
|
|
for an earlier certificate request, in
|
|
a trustpoint.
|
|
|
|
'certdelete' - Identity certificate deletion. This
|
|
operation is provided to delete the
|
|
identity certificate from a trustpoint.
|
|
If the certificate is the only generic
|
|
certificate in the device, delete is not
|
|
allowed; 'forcecertdelete' operation needs
|
|
to be used to force the delete.
|
|
|
|
'pkcs12import' - This operation is provided to facilitate
|
|
the importing of the identity
|
|
certificate, corresponding key-pair and
|
|
CA certificate/chain in pkcs#12 format
|
|
into a trustpoint.
|
|
|
|
'pkcs12export' - This operation is provided to facilitate
|
|
the exporting of the key-pair, identity
|
|
certificate and the CA certificate in
|
|
pkcs#12format from a trustpoint.
|
|
|
|
'certconfirm' - This operation is provided to confirm the
|
|
acceptability of a certificate after
|
|
manual verification of its fingerprint
|
|
subsequent to the action 'caauth', there
|
|
by completing that action and installing
|
|
the certificate in the trustpoint.
|
|
|
|
'certnoconfirm' - This operation is provided to confirm
|
|
the unacceptability of a certificate
|
|
after the manual verification of its
|
|
fingerprint subsequent to the action
|
|
'caauth', there by rejecting the
|
|
certificate and completing that action.
|
|
|
|
'forcecertdelete' - Same as 'certdelete' except it forces
|
|
the delete.
|
|
|
|
'crlimport' - CRL import. This operation is provided to
|
|
import a CRL into a trustpoint.
|
|
|
|
'crldelete' - CRL delete. This operation is provided to
|
|
delete the CRL from a trustpoint.
|
|
|
|
"
|
|
|
|
SYNTAX INTEGER {
|
|
noop (1),
|
|
caauth (2),
|
|
cadelete (3),
|
|
certreq (4),
|
|
certimport (5),
|
|
certdelete (6),
|
|
pkcs12import (7),
|
|
pkcs12export (8),
|
|
certconfirm (9),
|
|
certnoconfirm (10),
|
|
forcecertdelete (11),
|
|
crlimport (12),
|
|
crldelete (13)
|
|
|
|
}
|
|
|
|
CiscoPkiActionResult ::= TEXTUAL-CONVENTION
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Result of the PKI Support action performed. An instance
|
|
of this TC corresponds to an instance of the TC
|
|
CpkiAction.
|
|
|
|
'none' - No action was performed yet.
|
|
|
|
'success' - Execution of the action triggered is
|
|
completed successfully.
|
|
|
|
'failed' - Execution of the action triggered has
|
|
failed.
|
|
|
|
'inProgress' - Execution of the action triggered is
|
|
in progress.
|
|
|
|
'needConfirm' - Further continuation of execution of
|
|
the action triggered requires
|
|
confirmation from the user.
|
|
"
|
|
SYNTAX INTEGER {
|
|
none (1),
|
|
success (2),
|
|
failed (3),
|
|
inProgress (4),
|
|
needConfirm (5)
|
|
}
|
|
|
|
--
|
|
-- The RSA key-pair entries
|
|
--
|
|
|
|
cpkiRSAKeyPairTable OBJECT-TYPE
|
|
SYNTAX SEQUENCE OF CpkiRSAKeyPairEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"A list of RSA key-pair entries."
|
|
::= { cpkiConfig 1 }
|
|
|
|
cpkiRSAKeyPairEntry OBJECT-TYPE
|
|
SYNTAX CpkiRSAKeyPairEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The RSA key-pair entry. The entry specifies the key-pair
|
|
name, size, whether it is exportable and the filename
|
|
where the key-pair is stored. Each entry corresponds
|
|
to a RSA key-pair generated internally in the device or
|
|
imported from outside. When a new entry is created, a
|
|
new RSA key-pair is generated in the device and stored
|
|
in a corresponding file. When an entry is deleted through
|
|
row deletion, the corresponding key-pair is destroyed. The
|
|
entry is not allowed to be modified after creation as a
|
|
key-pair is not modifiable after its generation.
|
|
"
|
|
INDEX { cpkiRSAKeyPairName }
|
|
::= { cpkiRSAKeyPairTable 1 }
|
|
|
|
CpkiRSAKeyPairEntry ::=
|
|
SEQUENCE {
|
|
cpkiRSAKeyPairName SnmpAdminString,
|
|
cpkiRSAKeyPairId Unsigned32,
|
|
cpkiRSAKeyPairSize INTEGER,
|
|
cpkiRSAPvtKeyFileName SnmpAdminString,
|
|
cpkiRSAKeyPairExportable TruthValue,
|
|
cpkiRSAKeyPairStorageType StorageType,
|
|
cpkiRSAKeyPairConfigRowStatus RowStatus
|
|
}
|
|
|
|
cpkiRSAKeyPairName OBJECT-TYPE
|
|
SYNTAX SnmpAdminString (SIZE (1..64))
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The unique name or label of key-pair."
|
|
::= { cpkiRSAKeyPairEntry 1 }
|
|
|
|
cpkiRSAKeyPairId OBJECT-TYPE
|
|
SYNTAX Unsigned32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"A unique identification nubmer of the RSA key-pair.
|
|
This is included to support ordered lists of RSA
|
|
key-pairs when needed. One such scenario where such
|
|
ordered list may be needed is for per application
|
|
configuration of key-pairs."
|
|
::= { cpkiRSAKeyPairEntry 2 }
|
|
|
|
cpkiRSAKeyPairSize OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
rsa512 (1), -- 512-bit RSA key
|
|
rsa768 (2), -- 768-bit RSA key
|
|
rsa1024 (3), -- 1024-bit RSA key
|
|
rsa1536 (4), -- 1536-bit RSA key
|
|
rsa2048 (5) -- 2048-bit RSA key
|
|
}
|
|
MAX-ACCESS read-create
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The size of the key.
|
|
|
|
The following modulus sizes are defined:
|
|
512-bit, 768-bit, 1024-bit, 1536-bit and 2048-bit.
|
|
Once created, the size cannot be changed. After
|
|
key-pair has been deleted through row deletion,
|
|
the entry can be created again with another size.
|
|
"
|
|
DEFVAL { rsa512 }
|
|
::= { cpkiRSAKeyPairEntry 3 }
|
|
|
|
cpkiRSAPvtKeyFileName OBJECT-TYPE
|
|
SYNTAX SnmpAdminString (SIZE (0..255))
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The name of the file storing the RSA private key.
|
|
This filename is automatically generated from the
|
|
key-pair name. It is a unix style '/' seperated string
|
|
representing the absolute path of the file in the
|
|
file system of the device"
|
|
::= { cpkiRSAKeyPairEntry 4 }
|
|
|
|
cpkiRSAKeyPairExportable OBJECT-TYPE
|
|
SYNTAX TruthValue
|
|
MAX-ACCESS read-create
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The key-pair is exportable through the 'exportpkcs12'
|
|
PKI support action. Once created, the exportable flag
|
|
value cannot be changed. After key-pair has been
|
|
deleted through row deletion, the entry can be created
|
|
again with another value for the exportable flag"
|
|
DEFVAL { true }
|
|
::= { cpkiRSAKeyPairEntry 5 }
|
|
|
|
cpkiRSAKeyPairStorageType OBJECT-TYPE
|
|
SYNTAX StorageType
|
|
MAX-ACCESS read-create
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The storage type for this conceptual row."
|
|
DEFVAL { nonVolatile }
|
|
::= { cpkiRSAKeyPairEntry 6 }
|
|
|
|
cpkiRSAKeyPairConfigRowStatus OBJECT-TYPE
|
|
SYNTAX RowStatus
|
|
MAX-ACCESS read-create
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The conceptual row status of the key-pair entry.
|
|
Deleting an entry through row delete will fail if the
|
|
entry is being pointed to from an instance from
|
|
cpkiTrustPointTable.
|
|
|
|
The objects in the entry may not be modified while
|
|
the value of this object is active(1).
|
|
|
|
An attempt to set these objects while the value of
|
|
cpkiRSAKeyPairConfigRowStatus is active(1) will
|
|
result in an inconsistentValue error."
|
|
::= { cpkiRSAKeyPairEntry 7 }
|
|
|
|
--
|
|
-- The trustpoint entries
|
|
--
|
|
|
|
cpkiTrustPointTable OBJECT-TYPE
|
|
SYNTAX SEQUENCE OF CpkiTrustPointEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"A list of trustpoint, associated key-pair,
|
|
certificates and revocation checking
|
|
configuration entries.
|
|
|
|
The table also provides control, actions, current
|
|
operating state information and last action result
|
|
information for the certificate work-flow if being
|
|
carried out using the PKI support actions."
|
|
::= { cpkiConfig 2 }
|
|
|
|
cpkiTrustPointEntry OBJECT-TYPE
|
|
SYNTAX CpkiTrustPointEntry
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The trustpoint configuration entry. This entry
|
|
specifies the trustpoint name, the associated key-pair
|
|
index, the identity certificate filename, some important
|
|
attributes in the identity certificate and the issuer
|
|
(CA) certificate filename and important attributes in the
|
|
issuer certificate.
|
|
|
|
The entry also specifies the certificate revocation
|
|
checking methods and OCSP URL configuration.
|
|
"
|
|
INDEX { cpkiTrustPointName }
|
|
::= { cpkiTrustPointTable 1 }
|
|
|
|
CpkiTrustPointEntry ::=
|
|
SEQUENCE {
|
|
cpkiTrustPointName SnmpAdminString,
|
|
cpkiTrustPointId Unsigned32,
|
|
cpkiKeyPairName SnmpAdminString,
|
|
cpkiIdCertFileName SnmpAdminString,
|
|
cpkiIdCertSubjectName SnmpAdminString,
|
|
cpkiIdCertSerialNum SnmpAdminString,
|
|
cpkiIdCertStartDate DateAndTime,
|
|
cpkiIdCertEndDate DateAndTime,
|
|
cpkiIdCertFingerPrint SnmpAdminString,
|
|
cpkiIssuerCertFileName SnmpAdminString,
|
|
cpkiIssuerCertSubjectName SnmpAdminString,
|
|
cpkiIssuerCertSerialNum SnmpAdminString,
|
|
cpkiIssuerCertStartDate DateAndTime,
|
|
cpkiIssuerCertEndDate DateAndTime,
|
|
cpkiIssuerCertFingerPrint SnmpAdminString,
|
|
cpkiRevokeCheckMethods OCTET STRING,
|
|
cpkiOCSPurl SnmpAdminString,
|
|
cpkiAction CiscoPkiAction,
|
|
cpkiActionUrl SnmpAdminString,
|
|
cpkiActionPassword SnmpAdminString,
|
|
cpkiLastAction CiscoPkiAction,
|
|
cpkiLastActionResult CiscoPkiActionResult,
|
|
cpkiLastActionFailureReason SnmpAdminString,
|
|
cpkiTrustPointStorageType StorageType,
|
|
cpkiTrustPointConfigRowStatus RowStatus
|
|
}
|
|
|
|
cpkiTrustPointName OBJECT-TYPE
|
|
SYNTAX SnmpAdminString (SIZE (1..64))
|
|
MAX-ACCESS not-accessible
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The unique name or label of a trustpoint."
|
|
::= { cpkiTrustPointEntry 1 }
|
|
|
|
cpkiTrustPointId OBJECT-TYPE
|
|
SYNTAX Unsigned32
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"A unique identification number of the trustpoint.
|
|
This is included to support ordered lists of trustpoints
|
|
when needed. One such scenario where such ordered list
|
|
may be needed is for per application configuration of
|
|
trustpoints for certificate selection"
|
|
::= { cpkiTrustPointEntry 2 }
|
|
|
|
cpkiKeyPairName OBJECT-TYPE
|
|
SYNTAX SnmpAdminString (SIZE (0..64))
|
|
MAX-ACCESS read-create
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The name of the associated key-pair from a key-pair
|
|
table. If a key-pair is not yet associated, the value
|
|
of this object will be a zero length string.
|
|
|
|
If a key-pair is already associated, it can be modified
|
|
only if the identity certificate is absent as indicated
|
|
by a non-zero length string value of the object
|
|
cpkiIssuerCertFileName. This is because of the fact that
|
|
the identity certificate is certifying this key-pair."
|
|
::= { cpkiTrustPointEntry 3 }
|
|
|
|
cpkiIdCertFileName OBJECT-TYPE
|
|
SYNTAX SnmpAdminString (SIZE (0..255))
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The name of the file storing the identity
|
|
certificate. It is a unix style '/' seperated string
|
|
representing the absolute path of the file in the
|
|
file system of the device. If there is no identity
|
|
certificate obtained as yet, the value of this object
|
|
will be a zero length string.
|
|
|
|
This object gets its non-zero length string value
|
|
after a successful 'certimport' or 'pkcs12import'
|
|
PKI support action triggered on the object cpkiAction.
|
|
|
|
This object gets set to zero length string when the
|
|
identity certificate is deleted through a successful
|
|
'certdelete' action triggered on the object
|
|
cpkiAction."
|
|
::= { cpkiTrustPointEntry 4 }
|
|
|
|
cpkiIdCertSubjectName OBJECT-TYPE
|
|
SYNTAX SnmpAdminString (SIZE (0..255))
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The subject name of the identity certificate.
|
|
If there is no certificate (as indicated by a zero
|
|
length string value of the object cpkiIdCertFileName)
|
|
or no subject name in the certificate, the value of
|
|
this object will be a zero length string."
|
|
REFERENCE
|
|
"RFC 2459, Internet X.509 Public Key Infrastructure
|
|
Certificate and CRL Profile, Section 4.1.2.6"
|
|
::= { cpkiTrustPointEntry 5 }
|
|
|
|
cpkiIdCertSerialNum OBJECT-TYPE
|
|
SYNTAX SnmpAdminString (SIZE (0..255))
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The serial number of the identity certificate.
|
|
If there is no certificate (as indicated by a zero
|
|
length string value of the object cpkiIdCertFileName),
|
|
the value of this object will be a zero length string."
|
|
REFERENCE
|
|
"RFC 2459, Internet X.509 Public Key Infrastructure
|
|
Certificate and CRL Profile, Section 4.1.2.2"
|
|
::= { cpkiTrustPointEntry 6 }
|
|
|
|
cpkiIdCertStartDate OBJECT-TYPE
|
|
SYNTAX DateAndTime
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The time when the identity certificate starts to be
|
|
valid, corresponding to the notBefore field in the
|
|
certificate.
|
|
|
|
If there is no certificate (as indicated by a zero
|
|
length string value of the object cpkiIdCertFileName),
|
|
the value of this object will be a zero length string."
|
|
REFERENCE
|
|
"RFC 2459, Internet X.509 Public Key Infrastructure
|
|
Certificate and CRL Profile, Section 4.1.2.5"
|
|
::= { cpkiTrustPointEntry 7 }
|
|
|
|
cpkiIdCertEndDate OBJECT-TYPE
|
|
SYNTAX DateAndTime
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The time when the identity certificate validity ends,
|
|
corresponding to the notAfter field in the
|
|
certificate.
|
|
|
|
If there is no certificate (as indicated by the zero
|
|
length string value of the object cpkiIdCertFileName),
|
|
the value of this object will be a zero length string."
|
|
REFERENCE
|
|
"RFC 2459, Internet X.509 Public Key Infrastructure
|
|
Certificate and CRL Profile, Section 4.1.2.5"
|
|
::= { cpkiTrustPointEntry 8 }
|
|
|
|
cpkiIdCertFingerPrint OBJECT-TYPE
|
|
SYNTAX SnmpAdminString (SIZE (0..255))
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The MD5 fingerprint of the identity certificate in
|
|
HEX string format.
|
|
|
|
If there is no certificate (as indicated by a zero
|
|
length string value of the object cpkiIdCertFileName),
|
|
the value of this object will be a zero length string."
|
|
::= { cpkiTrustPointEntry 9 }
|
|
|
|
cpkiIssuerCertFileName OBJECT-TYPE
|
|
SYNTAX SnmpAdminString (SIZE (0..255))
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The name of the file storing the issuer certificate.
|
|
It is a unix style '/' seperated string representing
|
|
the absolute path of the file in the file system of
|
|
the device. If there is no issuer certificate obtained
|
|
yet, the value of this object will be a zero length
|
|
string.
|
|
|
|
This object gets its non-zero length string value
|
|
after a successful 'caauth' PKI support action
|
|
triggered on the object cpkiAction.
|
|
|
|
This object gets set to zero length string when the
|
|
issuer certificate is deleted through a successful
|
|
'cadelete' action triggered on the object
|
|
cpkiAction."
|
|
::= { cpkiTrustPointEntry 10 }
|
|
|
|
cpkiIssuerCertSubjectName OBJECT-TYPE
|
|
SYNTAX SnmpAdminString (SIZE (0..255))
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The issuer name (subject name in issuer certificate
|
|
which will be the same as the issuer name in the
|
|
identity certificate if present).
|
|
|
|
If there is no certificate (as indicated by a zero
|
|
length string value of the object cpkiIssuerCertFileName),
|
|
the value will be a zero length string."
|
|
REFERENCE
|
|
"1. RFC 2459, Internet X.509 Public Key Infrastructure
|
|
Certificate and CRL Profile, Section 4.1.2.6
|
|
2. RFC 2459, Internet X.509 Public Key Infrastructure
|
|
Certificate and CRL Profile, Section 5.1.2.3"
|
|
::= { cpkiTrustPointEntry 11 }
|
|
|
|
cpkiIssuerCertSerialNum OBJECT-TYPE
|
|
SYNTAX SnmpAdminString (SIZE (0..255))
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The serial number of the issuer certificate.
|
|
|
|
If there is no certificate (as indicated by a zero
|
|
length string value of the object
|
|
cpkiIssuerCertFileName), the value will be a zero
|
|
length string."
|
|
REFERENCE
|
|
"RFC 2459, Internet X.509 Public Key Infrastructure
|
|
Certificate and CRL Profile, Section 4.1.2.2"
|
|
::= { cpkiTrustPointEntry 12 }
|
|
|
|
cpkiIssuerCertStartDate OBJECT-TYPE
|
|
SYNTAX DateAndTime
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The time when the issuer certificate starts to be
|
|
valid, corresponding to the notBefore field in the
|
|
certificate.
|
|
|
|
If there is no certificate (as indicated by a zero
|
|
length string value of the object
|
|
cpkiIssuerCertFileName), the value will be a zero
|
|
length string."
|
|
REFERENCE
|
|
"RFC 2459, Internet X.509 Public Key Infrastructure
|
|
Certificate and CRL Profile, Section 4.1.2.5"
|
|
::= { cpkiTrustPointEntry 13 }
|
|
|
|
cpkiIssuerCertEndDate OBJECT-TYPE
|
|
SYNTAX DateAndTime
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The time when the issuer certificate validity ends,
|
|
corresponding to the notAfter field on in the
|
|
certificate.
|
|
|
|
If there is no certificate (as indicated by a zero
|
|
length string value of the object
|
|
cpkiIssuerCertFileName), the value will be a zero
|
|
length string."
|
|
REFERENCE
|
|
"RFC 2459, Internet X.509 Public Key Infrastructure
|
|
Certificate and CRL Profile, Section 4.1.2.5"
|
|
::= { cpkiTrustPointEntry 14 }
|
|
|
|
cpkiIssuerCertFingerPrint OBJECT-TYPE
|
|
SYNTAX SnmpAdminString (SIZE (0..255))
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The MD5 fingerprint of the issuer's certificate in
|
|
HEX string format.
|
|
|
|
If there is no certificate (as indicated by a
|
|
zero length string value of cpkiIssuerCertFileName),
|
|
the value of this object will be a zero length string."
|
|
::= { cpkiTrustPointEntry 15 }
|
|
|
|
cpkiRevokeCheckMethods OBJECT-TYPE
|
|
SYNTAX OCTET STRING (SIZE (16))
|
|
MAX-ACCESS read-create
|
|
STATUS current
|
|
DESCRIPTION
|
|
"Revocation checking methods list which is an ordered
|
|
list of certificate revocation checking methods to be
|
|
employed while verifying peer certificates issued by
|
|
the CA corresponding to this trust point entry.
|
|
|
|
The value of this object is a ordered list of one or
|
|
more 1-octet values, where each 1-octet value
|
|
corresponds to a method in the revocation checking method
|
|
enumeration:
|
|
|
|
none (1) - No revocation status checking needed;
|
|
instead consider the certificate as
|
|
not revoked.
|
|
|
|
crl (2) - Use CRL for checking the revocation
|
|
status of certificates.
|
|
|
|
ocsp (3) - Use OCSP for checking the revocation
|
|
status of certificates.
|
|
|
|
If 'none' occures in the list, it should be the last value.
|
|
The octets after the last value in the ordered list
|
|
should be zero octets.
|
|
|
|
The order in which the revocation checking methods
|
|
occur within the value of this object determines
|
|
the order the revocation checking methods are attempted
|
|
during the verification of a peer certificate.
|
|
|
|
The default value of this object (after row creation)
|
|
contains only the revocation checking method 'crl'."
|
|
|
|
DEFVAL { '02000000000000000000000000000000'H }
|
|
::= { cpkiTrustPointEntry 16 }
|
|
|
|
cpkiOCSPurl OBJECT-TYPE
|
|
SYNTAX SnmpAdminString (SIZE (0..255))
|
|
MAX-ACCESS read-create
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The contact http url of the external OCSP server for
|
|
certificate revocation checking using OCSP protocol.
|
|
|
|
The default value of this object (after row creation)
|
|
is a zero length string"
|
|
DEFVAL { ''H }
|
|
::= { cpkiTrustPointEntry 17 }
|
|
|
|
cpkiAction OBJECT-TYPE
|
|
SYNTAX CiscoPkiAction
|
|
MAX-ACCESS read-create
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The PKI support action to be triggered for this
|
|
trustpoint entry.
|
|
|
|
The PKI support actions are steps in the certificate
|
|
work-flow used to facilitate the configuration of the
|
|
RSAkey-pair, identity certificate and CA certificates
|
|
in a trustpoint. A PKI support action is triggered by
|
|
setting this object to the corresponding value as defined
|
|
in TC CiscoPkiAction. The value of this object and the
|
|
values of the objects cpkiActionUrl and cpkiActionPassword
|
|
are interpreted and applied together as single action
|
|
trigger. All thease actions operate over the trustpoint
|
|
and modify appropriate columns in the entry.
|
|
|
|
An attempt to set this object when the value of the
|
|
object cpkiActionResult is 'inProgress' will result in an
|
|
inconsistentValue error.
|
|
|
|
The work-flow nature of certificate operations requires
|
|
that the trustpoint entry already exists. Some of the
|
|
operation requires that some other previous operations
|
|
are already performed successfully, as seen below.
|
|
|
|
The following is a brief of each action semantics, its
|
|
parameters and the result:
|
|
|
|
'caauth' - This action is used to authenticate a CA and
|
|
configure its CA certificate/chain in this trustpoint. This
|
|
is generally the first step in a certificate work-flow.
|
|
It requires the parameter objects cpkiActionUrl and
|
|
cpkiActionPassword set with appropriate values. The CA
|
|
certificate/chain being installed should be available in
|
|
PEM fromat in a file on bootflash. The filename is
|
|
specified as 'bootflash:<filename>' as the value of the
|
|
object cpkiActionUrl. On successful completion of the
|
|
operation, the CA certificate fingerprint will be
|
|
available as the value of the object
|
|
cpkiIssuerCertFingerPrint and the value of the object
|
|
cpkiLastActionResult will be 'needConfirm'. This action
|
|
is to be followed up with a subsequent 'certconfirm' or
|
|
'certnoconfirm' as explained later, to complete the CA
|
|
authentication process.
|
|
|
|
'cadelete' - This action is used to delete the CA
|
|
certificate/chain from this trustpoint. On successful
|
|
completion of the operation, the values of all issuer
|
|
certificate related objects (cpkiIssuerCertFileName
|
|
etc.) in this trustpoint entry will zero length strings.
|
|
For this action to succeed, a CA certificate/chain should
|
|
have been already configured through the 'caauth' action.
|
|
|
|
'certreq' - This action is used to generate a pkcs#10
|
|
certificate signing request (CSR) needed to obtain an
|
|
identity certificate from the CA corresponding to this
|
|
trustpoint entry. This entry should have a key-pair
|
|
already associated (as indicated by non-zero value of
|
|
cpkiKeyPairIndex in the entry). Also the CA certificate/
|
|
chain should have been already configured through the
|
|
'caauth' action. This action requires the parameter
|
|
object cpkiActionPassword to be set with a password string
|
|
which will be used as the 'challenge password' attribute
|
|
in the CSR being created (the password being opional, it
|
|
should be a zero length string if no password is being
|
|
specified). On successful completion of the operation, the
|
|
value of the object cpkiActionUrl will contain a file name
|
|
string in the format 'bootflash:<filename>' which will
|
|
contain the CSR generated in PEM format. This CSR has to be
|
|
submitted to the CA to get the identity certificate. The
|
|
process of submitting CSR to the CA and getting the identity
|
|
certificate is a step not supported by this MIB currently.
|
|
Once the identity certificate is obtained, it has to be
|
|
installed in this trustpoint with a subsequent 'certimport'
|
|
action explained next.
|
|
|
|
'certimport' - This action is used to import in this
|
|
trustpoint, an idenetity certificate obtained from the
|
|
corresponding CA for an earlier CSR generated (previous
|
|
operation 'certreq'). It requires that the identity
|
|
certificate being installed be available in PEM fromat in a
|
|
file on bootflash. The filename is specified as
|
|
'bootflash:<filename>' as the value of the object
|
|
cpkiActionUrl. On successful completion of the operation,
|
|
the values of all identity certificate related objects
|
|
(cpkiIdCertFileName etc.) in this entry will get filled
|
|
with the appropriate strings as per the corresponding
|
|
attributes in the identity certificate.
|
|
|
|
'certdelete' - This action is used to delete the identity
|
|
certificate from this trustpoint. On successful completion
|
|
of the operation, the values of all identity certificate
|
|
related objects (cpkiIdCertFileName etc.) in this entry
|
|
will become zero length strings.
|
|
|
|
'pkcs12import' - This action is used to import the
|
|
key-pair, identity certificate and the CA certificate/chain
|
|
in pkcs#12 format into this trustpoint. It requires
|
|
that the file containing the import data be
|
|
available on bootflash and whose filename be specified as
|
|
'bootflash:<filename>' as the value of the object
|
|
cpkiActionUrl. It also requires that the parameter
|
|
object cpkiActionPassword to be set with a password
|
|
string to be used for decoding the pkcs#12 data. On
|
|
successful completion of the operation, an entry in the
|
|
cpkiRSAKeyPairTable will be created corresponding to the
|
|
imported key-pair and it will be named using the trustpoint
|
|
name specified. Secondly, the values of all identity
|
|
certificate related objects (cpkiIdCertFileName etc.)
|
|
and the values of all issuer certificate related objects
|
|
(cpkiIssuerCertFileName etc.)in this entry will get filled
|
|
with the appropriate strings as per the corresponding
|
|
attributes in the identity and CA certificates
|
|
respectively.
|
|
|
|
'pkcs12export' - This action is used to export the
|
|
key-pair, identity certificate and the CA certificate/chain
|
|
in pkcs#12 format from this trustpoint. It requires that
|
|
the filename to contain the exported data be specified as
|
|
'bootflash:<filename>' as the value of the object
|
|
cpkiActionUrl. It also requires that the parameter
|
|
object cpkiActionPassword to be set with a password string
|
|
to be used for encoding the pkcs#12 data. On successful
|
|
completion of the operation, the exported data will be
|
|
available on bootflash in the specified file.
|
|
|
|
'certconfirm' - This action is used to confirm as
|
|
acceptable, the certificate fingerprint for the action
|
|
'caauth' in this trustpoint As mentioned earlier, the
|
|
certificate fingerprint is available as the value of the
|
|
object cpkiIssuerCertFingerPrint and the value of the
|
|
object cpkiActionResult will be 'needConfirm' after a
|
|
successfull 'caauth' action on a trustpoint. On successful
|
|
completion of the 'certconfirm' operation, values of all
|
|
issuer certificate related objects (cpkiIssuerCertFileName
|
|
etc.) in this entry get filled with the appropriate strings
|
|
as per the attributes in the CA certificate.
|
|
|
|
'certnoconfirm' - This action is used to confirm as not
|
|
acceptable, the certificate fingerprint for the action
|
|
'caauth. As mentioned earlier, the certificate fingerprint
|
|
is available as the value of the object
|
|
cpkiIssuerCertFingerPrint and the value of the object
|
|
cpkiActionResult will be 'needConfirm' after a successfull
|
|
'caauth' action on a trustpoint. On successful completion
|
|
of the 'certnoconfirm' action subsequent to a 'caauth'
|
|
action, the import pending CA certificate/chain will be
|
|
rejected.
|
|
|
|
'forcecertdelete' - Same as 'certdelete' but the operation
|
|
is forced even if the certificate being deleted is the
|
|
last-most one.
|
|
|
|
'crlimport' - This action is used to import in this
|
|
trustpoint, the CRL obtained from the corresponding CA.
|
|
It requires that the CRL being imported be available in
|
|
PEM fromat in a file on bootflash. The filename is specified
|
|
as 'bootflash:<filename>' as the value of the object
|
|
cpkiActionUrl. On successful completion of the operation,
|
|
the CRL will be installed in the trustpoint. For this
|
|
action to succeed, a CA certificate/chain should
|
|
have been already configured through the 'caauth' action.
|
|
|
|
'crldelete' - This action is used to delete the CRL from a
|
|
trustpoint. This action does not require any parameters.
|
|
|
|
On successful completion of any of the above actions, the
|
|
result object cpkiActionResult will have the value
|
|
'success'. on any error during the execution of the action,
|
|
the object cpkiActionResult will be set with the value
|
|
'failed' and the object cpkiActionFailureReason will have
|
|
the appropriate failure message string.
|
|
|
|
An attempt to set this object with a value other than
|
|
'certconfirm' or 'certnoconfirm', when the value of the
|
|
object cpkiActionResult is 'needConfirm', will result in
|
|
an inconsistentValue error.
|
|
|
|
All Actions are done on existing entry, action trigger is
|
|
not allowed as part of row creation.
|
|
|
|
Retrieving the value of this object via SNMP will always
|
|
return 'noop'.
|
|
"
|
|
DEFVAL { noop }
|
|
::= { cpkiTrustPointEntry 18 }
|
|
|
|
cpkiActionUrl OBJECT-TYPE
|
|
SYNTAX SnmpAdminString
|
|
MAX-ACCESS read-create
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The value of this object indicates the filename
|
|
containig the input or output certificate data needed
|
|
for the PKI support action being triggered on this entry.
|
|
The filename should pe specified as 'bootflash:<filename>'
|
|
and it should be available on bootflash or get created on
|
|
bootflash depending upon the action being triggered.
|
|
"
|
|
::= { cpkiTrustPointEntry 19 }
|
|
|
|
cpkiActionPassword OBJECT-TYPE
|
|
SYNTAX SnmpAdminString (SIZE (0..64))
|
|
MAX-ACCESS read-create
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The value of this object indicates the password
|
|
required to perform the PKI support action being
|
|
triggered. This password is required to be
|
|
specified only for 'certreq', 'importpkcs12' and
|
|
'exportpkcs12' actions.
|
|
|
|
For security reasons, the value of this object, whenever
|
|
it is retrieved by the management prototcol, is always
|
|
the zero length string.
|
|
"
|
|
DEFVAL { ''H }
|
|
::= { cpkiTrustPointEntry 20 }
|
|
|
|
cpkiLastAction OBJECT-TYPE
|
|
SYNTAX CiscoPkiAction
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The PKI support action attempted last. In otherwords,
|
|
the value attempted to be set for cpkiAction object
|
|
last. If no action has been triggered for the trustpoint
|
|
after its creation, then retrieving the value of this
|
|
object will return 'noop'."
|
|
::= { cpkiTrustPointEntry 21 }
|
|
|
|
cpkiLastActionResult OBJECT-TYPE
|
|
SYNTAX CiscoPkiActionResult
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The result of the execution of the last PKI support
|
|
action (represented by the value of cpkiLastAction).
|
|
When the value of this object is 'inProgress', an
|
|
attempt to set the value of cpkiAction object will
|
|
return inConsistentError.
|
|
"
|
|
::= { cpkiTrustPointEntry 22 }
|
|
|
|
cpkiLastActionFailureReason OBJECT-TYPE
|
|
SYNTAX SnmpAdminString
|
|
MAX-ACCESS read-only
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The failure reason description for the failed
|
|
execution of PKI support action. If the object
|
|
cpkiActionResult has the value 'failed', then
|
|
this object contains the reason string as to why
|
|
it failed. Otherwise, the value of this object is
|
|
a zero length string.
|
|
"
|
|
::= { cpkiTrustPointEntry 23 }
|
|
|
|
cpkiTrustPointStorageType OBJECT-TYPE
|
|
SYNTAX StorageType
|
|
MAX-ACCESS read-create
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The storage type for this conceptual row."
|
|
DEFVAL { nonVolatile }
|
|
::= { cpkiTrustPointEntry 24 }
|
|
|
|
cpkiTrustPointConfigRowStatus OBJECT-TYPE
|
|
SYNTAX RowStatus
|
|
MAX-ACCESS read-create
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The conceptual row status of the trustpoint entry.
|
|
|
|
After row creation, the value of this object will
|
|
become active(1) as there is no prerequisite of certain
|
|
objects to be set to make this object active.
|
|
|
|
The various read-only objects of the row can be
|
|
populated only by means of the various PKI support
|
|
actions attempted by setting the cpkiAction object
|
|
with appropriate value.
|
|
|
|
Except the read-only objects mentioned, all other
|
|
objects of the entry can be modified when the row
|
|
is active subject to the restrictions, if any,
|
|
specified for each"
|
|
::= { cpkiTrustPointEntry 25 }
|
|
|
|
--
|
|
-- Conformance
|
|
--
|
|
|
|
cpkiMIBCompliances OBJECT IDENTIFIER
|
|
::= { cpkiMIBConform 1 }
|
|
cpkiMIBGroups OBJECT IDENTIFIER
|
|
::= { cpkiMIBConform 2 }
|
|
|
|
cpkiMIBCompliance MODULE-COMPLIANCE
|
|
STATUS current
|
|
DESCRIPTION
|
|
"The compliance statement for entities which implement the
|
|
CISCO-PKI-PARTICIPATION-MIB.my.
|
|
"
|
|
MODULE
|
|
MANDATORY-GROUPS {
|
|
cpkiConfigGroup
|
|
}
|
|
|
|
OBJECT cpkiRSAKeyPairStorageType
|
|
MIN-ACCESS read-only
|
|
DESCRIPTION
|
|
"Only read-only needs to be supported"
|
|
|
|
OBJECT cpkiTrustPointStorageType
|
|
MIN-ACCESS read-only
|
|
DESCRIPTION
|
|
"Only read-only needs to be supported"
|
|
|
|
OBJECT cpkiRSAKeyPairConfigRowStatus
|
|
SYNTAX INTEGER {
|
|
active (1),
|
|
createAndGo (4),
|
|
destroy (6)
|
|
}
|
|
DESCRIPTION
|
|
"Only 'createAndGo', 'destroy' and 'active' need to be
|
|
supported."
|
|
|
|
OBJECT cpkiTrustPointConfigRowStatus
|
|
SYNTAX INTEGER {
|
|
active (1),
|
|
createAndGo (4),
|
|
destroy (6)
|
|
}
|
|
DESCRIPTION
|
|
"Only 'createAndGo', 'destroy' and 'active' need to be
|
|
supported."
|
|
|
|
::= { cpkiMIBCompliances 1 }
|
|
|
|
--
|
|
-- Units of Conformance
|
|
--
|
|
|
|
cpkiConfigGroup OBJECT-GROUP
|
|
OBJECTS {
|
|
cpkiRSAKeyPairId,
|
|
cpkiRSAKeyPairSize,
|
|
cpkiRSAPvtKeyFileName,
|
|
cpkiRSAKeyPairExportable,
|
|
cpkiRSAKeyPairStorageType,
|
|
cpkiRSAKeyPairConfigRowStatus,
|
|
cpkiTrustPointId,
|
|
cpkiKeyPairName,
|
|
cpkiIdCertFileName,
|
|
cpkiIdCertSubjectName,
|
|
cpkiIdCertSerialNum,
|
|
cpkiIdCertStartDate,
|
|
cpkiIdCertEndDate,
|
|
cpkiIdCertFingerPrint,
|
|
cpkiIssuerCertFileName,
|
|
cpkiIssuerCertSubjectName,
|
|
cpkiIssuerCertSerialNum,
|
|
cpkiIssuerCertStartDate,
|
|
cpkiIssuerCertEndDate,
|
|
cpkiIssuerCertFingerPrint,
|
|
cpkiRevokeCheckMethods,
|
|
cpkiOCSPurl,
|
|
cpkiAction,
|
|
cpkiActionUrl,
|
|
cpkiActionPassword,
|
|
cpkiLastAction,
|
|
cpkiLastActionResult,
|
|
cpkiLastActionFailureReason,
|
|
cpkiTrustPointStorageType,
|
|
cpkiTrustPointConfigRowStatus
|
|
}
|
|
STATUS current
|
|
DESCRIPTION
|
|
"A collection of objects for configurations of the PKI support
|
|
"
|
|
::= { cpkiMIBGroups 1 }
|
|
|
|
END
|