Bosch Building Technologies

    cancel
    Showing results for 
    Search instead for 
    Did you mean: 

    How to create CA signed certificates for cameras and distribute CA certificate in large systems

    📚 Overview:

     

    This article provides a step by step description of how to create certificates and configure their distribution in the large systems. For some of the steps a domain controller and optionally a Windows Certification Authority are required. It is assumed that these components already exist in the system as setting up of them is out of this document scope.
     
    The article is written in a way that it makes it easier to troubleshoot the functions, but it does not necessarily mean that it offers the fastest way to set up the system. For faster system configuration some steps may be performed in a different order and workstations may be rebooted once all configuration steps are completed.

    BVMS recording authenticity feature


    In case any incident in a public building happens, the security officer needs to export a video clip and provide it to police as an evidence. Therefore the security system is required to provide a possibility to check that the exported video was not altered. As per most of the tenders this has to be achieved by hashing combined with certificates.

    The implementation of this requirement in BVMS is following.

     Central_Support_0-1655361636015.png

      

    The camera is signing the hash values with the private key of its HTTPS certificate and saves the video together with the certificate on the iSCSI. During the video authenticity check BVMS Operator Client makes a replay and checks the hash values against the received video footage and verifies the digital camera signature against the certificate installed in its Windows Certificate Store. It uses the certificates installed under trusted root certificates path. The system can handle certificates that are self-signed or signed by a Certification Authority (CA).

    Self-signed certificates are easier to create, but they are not so secure and that also would mean that each BVMS Operator Client should have each of the self-signed certificate from each camera installed on its Windows Certificate Store. Taking into account that a system can consist of more than 500 cameras and 50 BVMS Operator Clients, the manual setup and maintenance of such a system requires an inacceptable amount of time.

     

    Central_Support_1-1655361852930.png

     

    When using a CA signed certificate an effort of creating such a certificate for each camera is higher. This however provides a higher security and only 1 CA certificate has to be distributed on each BVMS Operator Client. Nevertheless executed manually for each single large system component this method also consumes an inacceptable amount of time.

    Central_Support_2-1655361890446.png

     

    Step-by-step guide

     

    Solution concept and system security


    In order to configure authenticity check in BVMS system, each camera has to have a certificate assigned to its HTTPs server. The certificate has to be installed on each BVMS Operator Client that should be able to verify the video.

     
    Out of the box all cameras have a default certificate, however due to a higher security level and a lower efforts of certificate installation on the Operator Client computer a CA signed certificate is more suitable for large systems.
     
    In this solution description camera certificates are created using Configuration Manager (CM). As CA certificate for signing the camera certificates CM can use a certificate from Domain Controller (DC) Windows Certification Authority or create its own MicroCA. Certificates of CM MicroCA can
    be saved in Certificate Store of the local computer or on a USB stick.

     
    The DC certificate is available in Local Machine Certificate Store. The CM MicroCA certificate can be saved in the Current User Certificate Store. In both cases certificates with their private keys are available directly on the computer and CM has to be installed on the same machine in order to use them. Saving a private key directly on the computer t hat is constantly online introduces a risk as this key might be extracted by an unauthorized person who manages to access the network. Therefore it is recommended to use the CA certificate from a Windows Certificate Store only if computer can be put offline once the certificate creation is completed. In case it is not possible, please make sure that the network is properly secured.
     
    A higher security level can be reached by saving a CM MicroCA certificate with its private key on the USB stick. The USB stick can be secured with encryption and removed from computer once it is not needed. In this case please consider creating a backup USB stick with the copy of CA certificate in case the original one is damaged.
    Once camera certificates are signed and created, the CA certificate has to be distributed to each BVMS Operator Client. In this solution concept it is done using Active Directory (AD). The CA certificate has to be exported by CM and imported to the group policy settings of AD. The exported
    CA certificate introduces low risk as only a certificate with public key is extracted in this case.

     

    Required system components


    In order to configure a bulk certificate creation and distribution, following components have to be available in the system:
    • CM version 7.10 or higher – for creating CA signed certificates in the cameras.
    • Configured Windows Certification Authority (Optional) – in case the domain certificate should be used for signing camera certificates. Setting up and configuring a Certification Authority is not within the scope of this document.
    • Domain Controller with an Active Directory – for distributing the CA certificate to the workstations.

     

    Versions


    This step by step description was created using following system component versions:
    • BVMS 10.0.0
    • CM 7.10
    • Camera firmware: 5.70 to 7.50
    • Server OS: Windows Server 2012; Windows Server 2016
    • Workstation OS: Windows 10

     

    1. Create camera certificates


     
    In order to create CA signed camera certificates a CA certificate has to be available in CM. In the solution described in this document there are 3 types of CA certificates recommended:
     
    1. CA certificate from DC Certification Authority
    2. CM own MicroCA certificate that is saved on the same computer in the Windows Certificate Store
    3. CM own MicroCA certificate saved on a USB stick
    This chapter describes how to load (in case of DC certificate) or create the CA certificates and how to create a nd sign the camera certificates. Even though CM can handle multiple CA certificates, for a normal operation only one CA certificate can be used.

    1.1 Using CA certificate from Domain Controller in Configuration Manager

     

    If a system DC has a Certification Authority with its own CA certificate configured and the network is properly secured, CM can use this certificate for signing the new created camera certificates .
    Please be aware of the risks described in the chapter Solution concept and system security.
    DC certificate can be loaded to CM in following way:
     
    1. Install CM 7.10 or higher on the same computer where the Domain Certification Authority is configured.
    2. In CM go to Preferences / Security and click on the button Load:

    Central_Support_3-1655362114595.png

     

    3. In order to use the CA certificate from Domain Certification Authority, choose Local Machine Certificate Store in the drop down menu:

    Central_Support_4-1655362160323.png

    Once the right certificate is chosen, press Load button.

    Central_Support_5-1655362188476.png

     

    The loaded certificate is shown under Preferences / Security. This certificate will be automatically used for signing the new created camera certificates.
     
    Central_Support_6-1655362232436.png

     

    1.2 Using MicroCA from Configuration Manager

     

    CM is capable of creating its own MicroCA and sign camera certificates with it. The MicroCA root certificate can be saved in the local Windows Certificate Store, as a smart token using a smart card or as a file on USB stick. The step by step description in this chapter concentrates on the solution with encrypted USB stick and local Windows Certificate Store.

     

    1.2.1 MicroCA certificate on Windows Certificate Store

     
    The CM MicroCA certificate on Windows Certificate Store can be created in the following way.
    By saving CM certificate on the computer that is meant to be online all the time please be aware of the risks discussed in the chapter 1.3.

    1. CM can be installed on any PC that fulfills the requirements from its release letter .
    2. In the CM go to Preferences / Security and click Create button:


    Central_Support_7-1655363751749.png

    3. Select Current User Certificate Store as Certificate store type, enter the rest of the data in the dialog and press Create button:

    Central_Support_8-1655363839181.png
    Once a root certificate was created, it appears in the CM under Preferences / Security.
    The certificate is now available on the computer and it can be loaded from the Current User Certificate Store again in case it was deleted from CM configuration.
     
    1.2.2 MicroCA certificate on USB stick

    The CM own MicroCA certificate on the USB stick can be configured in a following way:
     
    1. CM can be installed on any PC that fulfills the requirements from its release letter .
    2. Insert and unlock an encrypted USB to the computer where CM is installed.
    3. In the CM go to Preferences / Security and click Create button:
     
    Central_Support_9-1655363874281.png

     

    4. Select USB File as Certificate store type and location in the encrypted USB stick as Certificate store location, enter the rest of the data in the dialog and press Create button:

    Central_Support_10-1655363908619.png

     

    Once a root certificate was created, it appears in the CM under Preferences / Security.
    CM saves the link to the file with certificate, but not the certificate itself. Once the USB stick is removed no signing with the new created certificate is possible.

    Central_Support_11-1655363949891.png

     

    5. Create a security copy of the USB stick in order to avoid losing the CA certificate in case the original USB stick gets damaged. For this action no additional steps in CM are needed.
    Simply copy the content from one USB stick to the other.
     

    1.3 Replacing CA certificates in Configuration Manager

     

    CM can use multiple CA certificates for signing, however it is possible to use 1 CA certificate at once. Even though only 1 certificate is used, it has to be replaced regularly once its validity period has expired.
    In order to exchange a CA certificate the currently used one has to be deleted first. This can be done with delete button next to the certificate under Preferences / Security:

     

    Central_Support_12-1655364169764.png

    The next certificate can be uploaded or created with load or create buttons like explained in the chapters 1.1 and 1.2.


    1.4 Bulk creation of camera certificates using Configuration Manager


    Once CA certificate is available in CM configuration, bulk camera certificates can be created in a following way:
     
    1. In case cameras are protected with passwords, it makes sense to save their pass words in CM configuration. For that reason cameras first should be added to CM My Devices tab by right clicking them and choosing Add to System. If multiple cameras have the same password, choose multiple cameras in My Devices tab and enter the service password on the right side under General / Unit Access. Press save button.

    Note: If entire VRM is added to the CM My Devices tab, all the cameras in its configuration and their passwords are automatically included to CM. VRM can be added and authenticated in the same way like it is described for the cameras above.
     
    Central_Support_13-1655364626079.png

     

    2. Select multiple cameras, right click on them and choose Certificates / Create Certificate:

    Central_Support_14-1655364659084.png

     

    3. Click on New:

    Central_Support_15-1655364685374.png

     

    4. In the signing request generation mask enter the credentials, choose HTTPS server as usage and press Create button. If nothing is entered as a Common name, the certificate’s name will be its camera’s IP address. Please be also aware of restrictions described in the chapter 3. Restrictions

    Central_Support_16-1655364721817.png

     

    5. In case a CA certificate from USB stick is used, CM will prompt to enter the password of the certificate file that was configured in the chapter1.2.2 MicroCA certificate on USB stick, step 4. Select the check box Remember so that CM can use the password for signing the certificates of all the selected cameras. Otherwise CM will ask for a password for every camera separately. Press OK button to continue.

    Central_Support_17-1655364751925.png

     

    6. CM requests certificate signing requests from the cameras, signs them with CA certificate from its configuration and uploads the signed certificates back to the cameras. Operation status is shown in the progress bar for every camera separately. Please be aware that older cameras may take some minutes in order to generate a signing request.

    Central_Support_18-1655364781935.png

     

    Once the certification is done, the dialog window can be closed with the close button.
    Please be aware of restrictions described in the chapter 3. Restrictions

    Central_Support_19-1655364817357.png

     

    7. For video authentication feature in BVMS an authentication method has to be configured in the camera. The setting can be changed in CM under Camera/Video Input while multiple cameras are selected. SHA-256 method is recommended. Once configured press save button.

    Central_Support_20-1655364849540.png

     

    2. Distribute CA certificates to BVMS Operator Client computers


    2.1 Create AD computer group for BVMS Operator Client workstations


    1. In the AD computer open the Server Manager and go to Tools / Active Directory Users and Computers:
    Central_Support_21-1655364889814.png

     

    2. In the Active Directory Users and Computers navigate to Computers on the left side. On the right side right click and select New / Group:

    Central_Support_22-1655364917387.png

     

    3. Enter the group name and select group scope Global and group type Security. Click OK.

    Central_Support_23-1655364947102.png

     

    4. Right click the new created computer group and select Properties:

    Central_Support_24-1655364975667.png

     

    5. Press Add button in order to add the BVMS Operator Client workstations to the group:

    Central_Support_25-1655364999858.png

     

    6. In the next dialog click on the Object Types and check Computers and press OK in order to be able to enter the workstations’ host names.
    Central_Support_26-1655365027278.png

     

    7. Enter workstations’ host names and press OK:

    Central_Support_27-1655365053455.png

     

    The workstations are now added as member computers to the group. Press OK :

    Central_Support_28-1655365080250.png

     

    8. Reboot the added workstations so that the AD changes take effect immediately.

     

    2.2 Configure a domain policy for workstations group


    1. In the DC computer open the Server Manager and go to Tools / Group Policy Management:
    Central_Support_29-1655365117944.png

     

    2. Right click the domain and select Create a GPO in this domain, and Link it here:
     
    Central_Support_30-1655365168238.png

     

    3. Enter the group policies' name and click OK:

    Central_Support_31-1655365204341.png

     

    4. Click on the new created group policy, select Authenticated Users on the right side and press Remove button. This is because certificates should be applied only on the workstations and not on all the members of domain.

    Central_Support_32-1655365232706.png

     

    5. Click Add button and select the workstation computer group created in the chapter 2.1:

    Central_Support_33-1655365259144.png

     

    Central_Support_34-1655365282565.png

     

    6. Go to the Delegation tab, press Add button:

    Central_Support_35-1655365308347.png

     

    7. Enter the Authenticated Users and press OK. In the next dialog the permissions should be Read. Press OK.

    Central_Support_36-1655365335161.png

     

    8. It takes some minutes till group policies are applied to all computers by domain. In case an immediate effect is required force group policies manually be running the following command line on every workstation: gpupdate /force
    Central_Support_37-1655365358545.png

     

    2.3 Distribute CA certificate


    1. CA certificate with its public key can be exported using CM. Under Preferences / Security click on the export button:

     

    Central_Support_38-1655365392670.png

     

    2. Export certificate as .crt file:

    Central_Support_39-1655365420768.png

     

    3. Go to Group Policy Management like described in the chapter "Configure a domain policy for workstations group", right click the Workstations Group Policy Object created in the chapter "Create AD computer group for BVMS Operator Client workstations" and select Edit:

    Central_Support_40-1655365447701.png

     

    4. In the newly opened window on the left side navigate to Policies / Windows Settings / Security Settings / Public Key Policies, right click on the Trusted Root Certification Authorities on the right side and select Import:

    Central_Support_41-1655365476086.png

     

    5. In the Certificate Import Wizard leave the default settings and click Next:

    Central_Support_42-1655365509906.png

     

    6. Select the certificate exported in the step 2 and click Next:

    Central_Support_43-1655365562580.png

     

    7. Leave the default store to import the certificate – Trusted Root Certification Authorities – and click Next:

    Central_Support_44-1655365587305.png

     

    8. Review the selected options and click on Finish:

    Central_Support_45-1655365608190.png

     

    9. Once certificate was successfully imported it appears in the Group Policy Management Editor under Policies / Windows Settings / Security Settings / Public Key Policies / Trusted Root Certification Authorities:

    Central_Support_46-1655365631110.png

     

    It takes some minutes till group policies are applied to all computers by domain. The distributed certificates can be found on every computer that belongs to the group Workstations in MMC console under Certificates / Trusted Root Certification Authorities / Certificates:

    Central_Support_47-1655365655850.png

     

    3. Restrictions


    CM was tested with camera firmware 5.70 and newer. Older firmware is not supported.
    Older cameras like platform CPP3 do not provide a possibility to assign certificates to HTTPs server in the signing request dialog as these devices do not support different server types yet.

     

    Central_Support_48-1655365683003.png

     

    In case multiple HTTPS server capable and 1 incapable device are selected, the usage selection is disabled for all of them. Therefore it is recommended to create certificates separately for these 2 groups in order to avoid additional steps. Nevertheless, older device certificates created without usage are utilized for HTTPS connections and video authentication by the camera.
     
    By default certificate private key is created within a camera and CM is only downloading a signing request from the camera in order to create a CA signed certificate. Cameras with firmware version older than 6.50 handle certificates in a different way. In this case certificates with their private keys are created directly on the CM computer and uploaded to the camera over secured connection. Since handling of private key s on the local computer is considered to be not the safest way, the certificate type is indicated as “Locally created certificate” and the progress bar is colored yellow instead of green. A tool tip, when hovering with a mouse over the progress bar, advices to upgrade the firmware for more safety.

     

    Central_Support_49-1655365743896.png

     

    Glossary

    AD Active Directory
    BVMS Bosch Video Recording System
    CA Certification Authority
    CM Configuration Client
    CSR Certificate Signing Request
    DC Domain Controller

    Version history
    Last update:
    a month ago
    Updated by:
    Attachments
    Icon--AD-black-48x48Icon--address-consumer-data-black-48x48Icon--appointment-black-48x48Icon--back-left-black-48x48Icon--calendar-black-48x48Icon--center-alignedIcon--Checkbox-checkIcon--clock-black-48x48Icon--close-black-48x48Icon--compare-black-48x48Icon--confirmation-black-48x48Icon--dealer-details-black-48x48Icon--delete-black-48x48Icon--delivery-black-48x48Icon--down-black-48x48Icon--download-black-48x48Ic-OverlayAlertIcon--externallink-black-48x48Icon-Filledforward-right_adjustedIcon--grid-view-black-48x48IC_gd_Check-Circle170821_Icons_Community170823_Bosch_Icons170823_Bosch_Icons170821_Icons_CommunityIC-logout170821_Icons_Community170825_Bosch_Icons170821_Icons_CommunityIC-shopping-cart2170821_Icons_CommunityIC-upIC_UserIcon--imageIcon--info-i-black-48x48Icon--left-alignedIcon--Less-minimize-black-48x48Icon-FilledIcon--List-Check-grennIcon--List-Check-blackIcon--List-Cross-blackIcon--list-view-mobile-black-48x48Icon--list-view-black-48x48Icon--More-Maximize-black-48x48Icon--my-product-black-48x48Icon--newsletter-black-48x48Icon--payment-black-48x48Icon--print-black-48x48Icon--promotion-black-48x48Icon--registration-black-48x48Icon--Reset-black-48x48Icon--right-alignedshare-circle1Icon--share-black-48x48Icon--shopping-bag-black-48x48Icon-shopping-cartIcon--start-play-black-48x48Icon--store-locator-black-48x48Ic-OverlayAlertIcon--summary-black-48x48tumblrIcon-FilledvineIc-OverlayAlertwhishlist