Configuring OCSPd
Configuring the NTP server(s)
Step 1: Access the server through SSH with an account with administrative privileges;
Step 2: Load the OCSPd Configuration Utility with the following command:
# /opt/ocspd/sbin/ocspd-config
Step 3: In the main menu, select 'NTP':
Step 4: Specify the list of NTP server(s) separated by ',' and validate:
Step 5: The NTPs configuration is updated:
Step 6: Exit the configuration utility and restart the NTPd service with the following command:
# /etc/init.d/ntpd restart
Configuring the SMTP Relay
Step 1: Access the server through SSH with an account with administrative privileges;
Step 2: Load the OCSPd Configuration Utility with the following command:
# /opt/ocspd/sbin/ocspd-config
Step 3: In the main menu, select 'SMTP':
Step 4: Specify IP address or the DNS name of the SMTP relay and validate:
Step 5: The Postfix configuration is updated:
Step 6: Exit the configuration utility and restart the Postfix service with the following command:
# /etc/init.d/postfix restart
Configuring the OCSPd Administrator’s Email Address
Step 1: Access the server through SSH with an account with administrative privileges;
Step 2: Load the OCSPd Configuration Utility with the following command:
# /opt/ocspd/sbin/ocspd-config
Step 3: In the main menu, select 'Administrator':
Step 4: Specify the email address of the OCSPd Administrator and validate:
Step 5: Exit the Configuration Utility;
Step 6: Validate the SMTP relay and Administrator Email Address with the following commands:
# yum install mailx
# mail -s ‘Hello OCSPd’ root
> Hello From OCSPd
.
Step 7: Ensure that the email defined step 4 receives the test email.
Configuring the Radius Server
Step 1: Access the server through SSH with an account with administrative privileges;
Step 2: Load the OCSPd Configuration Utility with the following command:
# /opt/ocspd/sbin/ocspd-config
Step 3: In the main menu, select 'OCSPd':
Step 4: In the OCSPd menu, select 'RADIUS':
Step 5: Specify the following Radius configuration settings and validate:
| 'CHAP' and 'PAP' protocols are supported by OCSPd. |
Step 6: The OCSPd configuration is updated:
Configuring the LDAP Server
Step 1: Access the server through SSH with an account with administrative privileges;
Step 2: Load the OCSPd Configuration Utility with the following command:
# /opt/ocspd/sbin/ocspd-config
Step 3: In the main menu, select 'OCSPd':
Step 4: In the OCSPd menu, select 'RADIUS':
Step 5: Specify the following LDAP configuration settings and validate:
| By default the LDAP configuration will use port 389 and SSL/TLS 'false'. |
| The filter settings is optional. |
Step 6: The OCSPd configuration is updated:
Generating a new OCSPd Application Secret
Step 1: Access the server through SSH with an account with administrative privileges;
Step 2: Load the OCSPd Configuration Utility with the following command:
# /opt/ocspd/sbin/ocspd-config
Step 3: In the main menu, select 'OCSPd':
Step 4: In the OCSPd menu, select 'SECRET':
Step 5: Validate the new OCSPd Application Secret:
Step 6: The OCSPd configuration is updated:
Installing the OCSPd license
Step 1: Upload the 'ocspd.lic' file through SCP under '/tmp/ocspd.lic':
Step 2: Access the server through SSH with an account with administrative privileges;
Step 3: Move the license file and set the permissions using the following commands:
# mv /tmp/ocspd.lic /opt/ocspd/etc
# chown ocspd:ocspd /opt/ocspd/etc/ocspd.lic
# chmod 640 /opt/ocspd/etc/ocspd.lic