Setting up MVE to manage certificates automatically

Understanding the automated certificate management feature

You can configure MVE to manage printer certificates automatically, and then install them to the printers through configuration enforcement. The following diagram describes the end-to-end process of the automated certificate management feature.

A flowchart showing the automated certificate management process

The certificate authority endpoints, such as the CA server and server address, must be defined in MVE.

The following CA servers are supported:

For more information, see the following topics:

The connection between MVE and the CA servers must be validated. During validation, MVE communicates with the CA server to download the certificate chain and the Certificate Revocation List (CRL). The enrollment agent certificate or test certificate is also generated. This certificate enables the CA server to trust MVE.

For more information on defining the endpoints and validation, see Configuring MVE for automated certificate management.

A configuration that is set to Use Markvision to manage device certificates must be assigned and enforced to the printer.

For more information, see the following topics:

During enforcement, MVE checks the printer for conformance.

For Default Device Certificate

For Named Device Certificate

Notes:

Configuring MVE for automated certificate management

  1. Click the settings icon on the upper-right corner of the page.

  2. Click Certificate Authority > Use Certificate Authority Server.

    Note: The Use Certificate Authority Server button appears only when configuring the certificate authority for the first time, or when the certificate is deleted.
  3. Configure the server endpoints.

    • CA Server—The Certificate Authority (CA) server that generates the printer certificates. You can select either OpenXPKI CA or Microsoft CA Enterprise.

    • CA Server Address—The IP address or host name of your CA server. Include the full URL.

    • Challenge Password—Challenge Password is required to assert the identity of MVE to the CA server. This password is only required for OpenXPKI CA. It is not supported in Microsoft CA Enterprise.

    From the CA Server Protocol menu, if you select the MSCEWS protocol, you must configure the server authentication mode. From the CA Server Authentication Mode menu, select any of the following:

    • Username and Password Authentication

    • Client Certificate Authentication

    • Windows Integrated Authentication

    Note: Depending on your CA server, see Managing certificates using OpenXPKI Certificate Authority, Managing certificates using Microsoft Certificate Authority through SCEP, or Managing certificates using Microsoft Certificate Authority through MSCEWS.
  4. Click Save Changes and Validate > OK.

    Note: The connection between MVE and the CA servers must be validated. During validation, MVE communicates with the CA server to download the certificate chain and the Certificate Revocation List (CRL). The enrollment agent certificate or test certificate is also generated. This certificate enables the CA server to trust MVE.
  5. Navigate back to the System Configuration page, and then review the CA certificate.

    Note: You can also download or delete the CA certificate.

Configuring Microsoft Enterprise CA with NDES

Overview

In the following deployment scenario, all permissions are based on permissions set on certificate templates that are published in the domain controller. The certificate requests sent to the CA are based on certificate templates.

For this setup, make sure that you have the following:

Required users

Create the following users in the domain controller: