Certificates Management and PKI

NOTE: Before you begin working on the PKI Configuration web page, familiarize yourself with the general description of certificates management.
The BMENOR2200H module relies upon certificates for authentication. To provide cyber security, each entity manages a trust list of all certificates of devices and applications that communicate with it. The method of certificate management depends on your system design, which may or may not apply a public key infrastructure (PKI) with a certificate authority (CA):
  • Certificates Management without PKI: Use this certificate management method if your system does not include a CA. Manage certificates in the certificates management web pages as follows:
    • Self-signed only is the system default PKI mode.

    • You can only switch the device factory reset mode to self-signed only mode.

    • Manage the Certificate Trust List using the Add and Delete functions to create an allowed list that is authorized to communicate with the RTU module.

    • Click the Download button (below) to export the RTU module certificate to communicated devices.

  • Certificates Management with PKI: Access the PKI Configuration web page and configure the parameters as described below.

Access the Page

Access the PKI Configuration web page through the SETUP tab for the BMENOR2200H module ( SETUP > MENU > CERTIFICATES MANAGEMENT > PKI Configuration ).

PKI Parameters

Manage the allotment and acceptance of certificates with the following PKI parameters if your system includes a CA.

PUBLIC KEY INFRASTRUCTURE SETTINGS parameters:

Parameter

Description

PKI Mode

Self-Signed only: This is the default PKI mode for the system.

CA only: All installed devices support PKI. Manually enroll each RTU module with the CA.

Self-Signed & CA: Some installed devices do not support PKI.

Considerations:
  • The certificate for the RTU module is issued by a CA.

  • Certificates for devices that support PKI are issued by a CA.

  • Certificates for devices that do not support PKI are self-signed.

Manually enroll each RTU module with the CA. Manage the trusted list to create an allowed list that is authorized to communicate with the RTU module.
NOTE: Only certificates in the Trusted List Management list need to be managed.

Submit

Click this button to assign the PKI mode.

DEVICE CERTIFICATION parameters:

Parameter

Description

Subject

This line identifies the host or party that controls the private key certification.

Subject Alternative Name

The structured name in this field includes the domain and sub-domain names and the IP addresses that the certificate secures.

Issuer

This field shows the entity that issued the certificate.

Expiration Date

This field shows the expiration date of the certificate.

Download

Click this button to export the RTU module certificate for HTTPS on your PC.

ENROLLMENT parameters:

Parameter

Description

1. Generate CSR

Click this button to download on your PC a Certificate Signing Request (CSR) in the Privacy Enhanced Mail (.pem) format.

2. Select the certificate file to upload

Enter an X.509v3 certificate that is encoded in ASN.1 (DER). A CA installed in the device produced this certificate from the downloaded CSR for the device.
NOTE: You can use the Browse button to navigate to the file.

Upload

Click this button to upload on the module an offline file that contains a configuration for communications with the CA by receiving the certificate through the CSR.

NOTE: Refer to the description of the manual certificate-enrollment process.

PKI Mode Setting Flowchart

This diagram illustrates the user actions and events related to changing the PKI mode setting:

Execute Changes

After you configure any of these parameters, press the Apply button in the page banner to implement your changes.
NOTE: The Apply and Discard buttons are disabled (grayed out) when the configuration is not valid.

Manual Enrollment

After configuring the RTU module in Control Expert, you can use the PKI Configuration MENU, ENROLLMENT section to get a CSR file to be submitted to a CA. After submitting the CSR file, you can then extract the correspondent CA certificate. Thereafter, you can push this CA Certificate into the RTU module. The combined get and push operations manually enroll a certificate issued by a third-party CA. After the certificate is pushed, the server applies this certificate for the purpose of signing and encrypting its communication with the client.

The following is an overview of the manual certificate enrollment process:

1 The BMENOR2200H imports a Root CA Management MENU from the certificate authority (CA).

2 The BMENOR2200H generates a certificate signing request (CSR).

3 The BMENOR2200H exports the CSR to the CA.

4 The CA executes the CSR and generates a certificate.

5 The BMENOR2200H imports the certificate from the CA.