802.1x Certificates
The Wiki of Unify contains information on clients and devices, communications systems and unified communications. - Unify GmbH & Co. KG is a Trademark Licensee of Siemens AG.
ToDo: Page to be translated to English - any contribution is welcome!
This page summarizes the requirements for certificates and their properties, as they apply to the 802.1x (EAP-TLS) authentication of OpenStage and optiPoint IP phones.
Contents
1. Basic requirements to 802.1x certificates
- The intended purpose must be "client authentication".
 - The purpose to use must be "signature and encryption".
 - The type is X.509-certificate, version: 3.
 - The algorithm class for the private dey is: 0xa000(5) ALG_CLASS_KEY_EXCHANGE
 - Normally is used sha1RSA, however, it can be fallen back on various other algorithms, provided that these algorithms are supported by OpenSSL and e.g. Win2003.
 - From DLS view there are any X.509 V3 certificates possible. The only restriction is the size (max. approx. 7kB).
 
Phone-certificate
- X509v3 Extended Key Usage: Client Authentication
 - RSA Public Key: (1024 bit) with optiPoint, (2048 bit) with OpenStage
 
RADIUS-certificate
- RSA Public Key: (2048 bit)
 - X509v3 extensions:
 - X509v3 Key usage: critical, digital signature, key Encipherment, key agreement, certificate Sign
 - X509v3 Extended key usage: server authentication, client authentication
 
SubCA-certificate
- RSA Public Key: (2048/4096 bit)
 - X509v3 extensions:
 - X509v3 Basic Constraints: critical, CA:TRUE
 - X509v3 Key Usage: critical, Digital Signature, Certificate Sign, CRL Sign
 
RootCA-certificate
- RSA public key: (2048/4096 bit)
 -  X509v3 extensions:
- X509v3 basic constraints: critical, CA:TRUE
 - X509v3 Key usage: critical, digital signature, certificate sign, CRL Sign
 
 
2. Rules for logon names
- The certificate element "CommonName" must meet the requirements of Microsoft's "Rules of Logon Names" (e.g. http://technet.microsoft.com/en-us/library/bb726984.aspx) respectively UPN (User Principal Names)(MS Windows Server 2003, Internet Authentication Service (IAS) Operation Guide)
 -  Logon names must follow these rules 
- Phone-certificate(certificate chain + priv. key in PKCS#12 container)
 - RootCA-certificate (= public key = first element of the RADIUS-certificate chain) or
 - RADIUS-certificate (= public key des RADIUS-certificates)
 - Key size: 1024 Bit
 
 -  OpenStage SIP/HFA: 
- Phone-certificate (certificate chain + priv. key in PKCS#12 container)
 - RootCA-certificate (= public key = first element of the RADIUS-certificate chain)
 - Key size: max. 2048 Bit, should be limited for reasons of the compatibility to optiPoint to 1024 bits
 
 -  Certificates on Wired Client Computers: For the user and computer certificates installed on wired client computers, the following must be true
- They must have a corresponding private key.
 - They must contain the Client Authentication EKU (OID "1.3.6.1.5.5.7.3.2")
 - Computer certificates must be installed in the Local Computer certificate store.
 - Computer certificates must contain the FQDN of the wired client computer account in the Subject Alternative Name property.
 - User certificates must be installed in the Current User certificate store.
 - User certificates must contain the user principal name (UPN) of the user account in the Subject Alternative Name property.
 
 
3. Difference between optiPoint und OpenStage
-  optiPoint SIP/HFA: 
- Phone-certificate(certificate chain + priv. key in PKCS#12 container)
 - RootCA-certificate (= public key = first element of the RADIUS-certificate chain) or
 - RADIUS-certificate (= public key des RADIUS-certificates)
 - Key size: 1024 Bit
 
 -  OpenStage SIP/HFA: 
- Phone-certificate (certificate chain + priv. key in PKCS#12 container)
 - RootCA-certificate (= public key = first element of the RADIUS-certificate chain)
 - Key size: max. 2048 Bit, should be limited for reasons of the compatibility to optiPoint to 1024 bits.
 
 



