Grant the CA Connector Client Service Account Permissions on the CA

In order to allow the Keyfactor CA ConnectorClosed The Keyfactor CA Connector is installed in the customer environment to provide a connection between a CA and Keyfactor Command when a direct connection is not possible. It is supported on both Windows and Linux and has versions for Microsoft (Windows only) or EJBCA CAs. to make a connection to the CAClosed A certificate authority (CA) is an entity that issues digital certificates. Within Keyfactor Command, a CA may be a Microsoft CA or a Keyfactor gateway to a cloud-based or remote CA. to read certificate records, enroll for new certificates, and perform management functions such as revocation, the service account configured for CA Connection Access (see CA Connection Access) must be granted appropriate permissions to the CA database.

Microsoft CAs

In the Microsoft management console (MMC) for each CA that a CA Connector Client will interact with, open the properties for the CA and grant the CA connection service account (see CA Connection Access):

Figure 681: Grant CA Permissions for a Microsoft CA

EJBCA CAs

In the EJBCA administration portal for each CA that a CA Connector Client will interact with, create or select a role that the end entity associated with the certificate or OAuth provider that is used to make the connection from the CA Connector Client (see CA Connection Access) will hold and make certain that the access rules for that role include the permissions shown in Figure 682: Grant CA Permissions for an EJBCA CA. The end entity or OAuth provider must hold all the roles shown for full functionality (where Sample is the name of your end entity profile). You may wish to grant the /ra_functionality/create_end_entity/ permission to allow the end entity to create new end entities, which is useful during configuration.

Figure 682: Grant CA Permissions for an EJBCA CA