Claims

During installation, two claims are created to provide initial access to the AnyCAGateway REST portal. The client authentication certificate or OAuth credentials specified for the SuperAdmin parameterClosed A parameter or argument is a value that is passed into a function in an application. in the installation command are used to generate both an admin and a user claim for the portal (see -Super Admin Value). To accommodate different users, you can create additional claims using separate authentication certificates or OAuth credentials.

Figure 766: Claims Tab with OAuth Authentication

Important:  In order for Keyfactor Command to perform synchronization of certificates from the gateway to Keyfactor Command, the OAuth client or client authentication certificate (see Keyfactor Command Connect Client Authentication Certificate) you configure in Keyfactor Command on the gateway CAClosed A certificate authority (CA) is an entity that issues digital certificates. Within Keyfactor Command, a CA may be a Microsoft CA or a Keyfactor gateway to a cloud-based or remote CA. record must be created as a claim in the gateway and granted the user role. This must be completed before configuring the gateway as a CA in Keyfactor Command (see Configuring the AnyCAGateway REST with Keyfactor Command). This same claim is used for enrollmentClosed Certificate enrollment refers to the process by which a user requests a digital certificate. The user must submit the request to a certificate authority (CA). and revocation requests made to the gateway through Keyfactor Command.
Roles

There are two roles available for assigning security on the AnyCAGateway REST portal.

Tip:  If users and/or services will make requests to the gateway for enrollment and/or revocation outside of Keyfactor Command, they will need a role, and a new claim should be created for each of these users and services with the user role, since these do not need the admin role for these functions.
Claims