How to generate certificates through RCM-API with extensions enforced through a profile?
Originally Published: 2010-02-02
Article Number
Applies To
RSA Certificate Manager 6.8
Issue
How to generate certificates through RCM-API with extensions enforced through a profile
How to generate certificates through RCM-API consistent with those generated through Enrollment Server, with extensions enforced through a profile
XrcCONVERSIONFAILURE
Resolution
- Configure a single Extension Profile with all the required extensions in the jurisdiction
- Configure the Extension Profile such that no interactive data is required (to be entered by admin when vetting certificates through Certificate Operations workbench)
- All extensions that must be included in the certificate should be marked Mandatory in the Extension Profile
- For all extensions marked as Mandatory in the Extension Profile, the individual element type and value type must be set to 'mandatory' (see Note below)
- All editable/visible flags can optionally be set to false for extensions in the Extension Profile (so that an administrator or vettor does not have the ability to change any extension values when vetting a request)
- Enable 'Enforce Profile Definition' in the jurisdiction
- No need to manually set any extensions in RCM-API application
- No need to make calls to XudaEnforceProfile() in RCM-API application
- XresCERTIFICATEPROFILE resource must be set with the enforced Extension Profile ID in RCM-API application
Note: If any of the extensions in the Extension Profile is not set correctly, a call to XudaCASignCertificate() to generate certificate may return an error XrcCONVERSIONFAILURE.
Notes
There is one exception to the above rule: If Certificate Attributes section in the Jursidiction is configured to add an email address to the subject DN, AND the extension profile (being enforced in the jurisdiction) is configured to include a second email address in Subject Alternate Name (SAN) extension, then "type" attribute for "otherName" component should be set to "optional" rather than "mandatory".
For example, SAN extension configured in the profile as follows would throw an error XrcCONVERSIONFAILURE:
{
name : 'Subject Alternative Names',
type : 'mandatory',
critical : {
def : false,
editable : false,
visible : true,
type : 'mandatory'
},
generalNames : {
min : 1,
max : 1,
def : 1,
editable : false,
visible : false,
elements : [
{
def : 'otherName',
editable : false,
visible : true,
type : 'mandatory',
value : {
typeid : {
def : '1.3.6.1.4.1.311.20.2.3',
editable : false,
visible : true,
type : 'mandatory',
validator : 'extCheckOID(this)'
},
value : {
def : 'someuser@rsa.net',
editable : true,
visible : true,
type : 'mandatory',
validator : 'extCheckEmail(this)'
}
}
}
]
}
}
However, updating the above SAN extension in the profile to the following will work fine:
{
name : 'Subject Alternative Names',
type : 'mandatory',
critical : {
def : false,
editable : false,
visible : true,
type : 'mandatory'
},
generalNames : {
min : 1,
max : 1,
def : 1,
editable : false,
visible : false,
elements : [
{
def : 'otherName',
editable : false,
visible : true,
type : 'optional',
value : {
typeid : {
def : '1.3.6.1.4.1.311.20.2.3',
editable : false,
visible : true,
type : 'mandatory',
validator : 'extCheckOID(this)'
},
value : {
def : 'someuser@rsa.net',
editable : true,
visible : true,
type : 'mandatory',
validator : 'extCheckEmail(this)'
}
}
}
]
}
}
CMAPI-171
Related Articles
How to Generate SSL Certificate Request and Private Key from the RSA SecurID Access Admin Console 419Number of Views How to generate certificates via RCM-API that include custom attribute in subject DN 7Number of Views Reverting back to the RSA self-signed default certificates on Authentication Manager 8.x 2.33KNumber of Views How to Update the Root (Server) and Client Certificates in RSA Identity Governance & Lifecycle 2.17KNumber of Views How to create and configure certificates for HTTPS access when using intermediate CA certs in RSA Identity Governance & Li… 1.02KNumber of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) How to factory reset an RSA Authentication Manager 8.x hardware appliance without a factory reset button from the Operatio… Deploying RSA Authenticator 6.2.2 for Windows Using DISM Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?