====== 4.6 Certificate Management ======
Management of PQ certificates.
===== Certificate Types =====
^ Type ^ Location ^ Rotation ^
| Server Certificate | %CERTS_PATH%\server.pfx | Annually |
| Root CA | %CERTS_PATH%\CA\root-ca.crt | 10+ Years |
| Client Certificates | Issued via CA | Annually |
===== Renew Server Certificate =====
# 1. Request new certificate
# 2. Update proxy configuration
# 3. Restart proxy service
Restart-Service "DataGatewayProxy"
===== Issue Client Certificates =====
# Receive CSR from client
# Sign certificate
openssl x509 -req -in client.csr -CA ca.crt -CAkey ca.key \
-CAcreateserial -out client.crt -days 365
===== Revocation =====
# Revoke certificate
openssl ca -revoke client.crt -keyfile ca.key -cert ca.crt
# Update CRL
openssl ca -gencrl -out ca.crl -keyfile ca.key -cert ca.crt
===== Trust Server =====
The central Trust Server validates certificates:
POST https://trust.intern/api/validate
{
"certificate": "base64-encoded-cert",
"purpose": "client-auth"
}
Response:
{
"valid": true,
"subject": "CN=developer1",
"issuer": "CN=Internal CA",
"expiresAt": "2025-12-31T23:59:59Z"
}
===== PQ-Crypto Library =====
For programmatic certificate management with PQ support see:
* [[..:..:..:..:..:pqcrypt:developer:beispiele:zertifikat-verwaltung:start|Detailed Guide: Certificate Management]]
* [[..:..:..:..:..:pqcrypt:api:wvds-system-security-cryptography:x509certificates:x509storeextensions|X509Store Extensions]]
* [[..:..:..:..:..:pqcrypt:api:wvds-system-security-cryptography:x509certificates:certificaterevocationlistextensions|CRL Extensions]]
* [[..:..:..:..:..:pqcrypt:developer:beispiele:pki-aufbau:start|PKI Setup with PQ]]