PKI 9 Configuring SCEP Responder - dogtagpki/pki GitHub Wiki
The SCEP responder can be configured in /var/lib/pki-ca/conf/CS.cfg:
ca.scep.enable=true ca.scep.encryptionAlgorithm=DES3 ca.scep.allowedEncryptionAlgorithms=DES,DES3 ca.scep.hashAlgorithm=SHA1 ca.scep.allowedHashAlgorithms=SHA1,SHA256,SHA512 ca.scep.nonceSizeLimit=16
SCEP supports usage of its own key pair, which can be configured by adding the following line:
ca.scep.nickname=scepSigningCert cert-pki-ca ca.scep.tokenname=Internal Key Storage Token
to the SCEP section of /var/lib/pki-ca/conf/CS.cfg.
Keep in mind that to enable separate SCEP key pair:
- 
new SCEP key pair has to be designated 
- 
SCEP certificate has to be created 
- 
SCEP certificate has to be imported to NSS-DB using scepSigningCert cert-pki-caas its nickname
SCEP support for its own key pair was tested using existing OCSP keys and certificate. Test was configured by adding the following line:
ca.scep.nickname=ocspSigningCert cert-pki-ca ca.scep.tokenname=Internal Key Storage Token
to the SCEP section of /var/lib/pki-ca/conf/CS.cfg.
Note that ca.crt was replaced by ocsp.crt.
$ sscep enroll \
    -u http://<hostname>:9180/ca/cgi-bin/pkiclient.exe \
    -c ocsp.crt \
    -k local.key \
    -r local.csr \
    -E 3des \
    -S sha256 \
    -l cert.crt \
    -d
Add IP address and password to /var/lib/pki-ca/conf/flatfile.txt.
Leave empty line between and after each pair of lines containing UID and PWD.