The following service configuration properties can be modified
for the Signature service. (See
Editing service configurations
.)
Some of the values are used as default values for operation properties.
To override the default values, specify different values for the
operation properties.
-
Execute Document JavaScripts scripts:
-
Specifies whether to execute Document JavaScript scripts
in Acrobat or Adobe Reader during signature operations. By default,
the option is selected, which means to execute Document JavaScript
scripts during signature operations.
-
Process Documents with Acrobat 9 Compatibility:
-
Specifies whether to enable Acrobat 9 compatibility. For
example, when this option is selected, Visible Certification in
Dynamic PDFs is enabled. By default, the option is selected, which
means to allow for Acrobat 9 compatibility.
-
Embed Revocation Info While Signing:
-
Specifies whether revocation information is embedded while
signing the PDF document. By default, the option is selected, which
means that revocation information is embedded when the Signature
service operation signs the PDF document.
-
Embed Revocation Info While Certifying:
-
Specifies whether the revocation information is embedded
while certifying the PDF document. By default, the option is selected,
which means that revocation information is embedded when the Signature
service signs the PDF document.
-
Enforce Embedding of Revocation Info for all Certificates During
Signing/Certification:
-
Specifies whether a signing or certification operation fails
if valid revocation information for all certificates is not embedded.
When a certificate does not contain any Certificate Revocation List (CRL)
or Online Certification Server Protocol (OCSP) information, it is
considered valid, even if no revocation information is retrieved.
By default, the option is not selected, which means that signing
and certification operations do not fail regardless of whether revocation
information is embedded.
-
Revocation Check Order:
-
Specifies the order of mechanisms to use to perform revocation
checking. By default, the selected value is OCSPFirst. Select one
of the following values:
-
Maximum Size of Revocation Archival Info:
-
Specifies the maximum size of the revocation archival info
in kilobytes. LiveCycle ES2.5 attempts to store as much revocation
information as possible without exceeding the limit. The default
value is
10
KB.
-
Verification Time Option:
-
Specifies the time of verification of a signer's certificate.
By default, the selected value is Signing Time. Select one of the
following values:
-
Signing Time:
The time that
the signature was applied as given by the signer's computer.
-
Current Time:
The time that the verification operation
is being carried out.
-
Secure Time Else Current Time:
The time specified
by a trusted time-stamping authority.
-
Use Revocation Information Archived in Signature During Validation:
-
Specifies whether the revocation information that is archived
with the signature is used for revocation checking. By default,
the option is selected.
-
Use Validation Information Stored in the Document for
Validation of Signatures:
-
Specifies whether to use the validation information that
is stored in the PDF document to validate digital signatures. This option
is a part of the Long Term Validation support available in Acrobat
9.1 and the Signature service, which creates a Digital Signature
Standard (DSS) dictionary in the PDF document. The DSS dictionary
stores the validation information for the signatures in the document.
The validation information includes certificates, revocation information,
and timestamp information. In previous releases of Acrobat and LiveCycle
ES2.5, the validation information was stored as a part of the digital
signature.
The option is selected by default, which means
to use the validation information that is stored in the PDF document
to validate digital signatures.
-
Maximum Nested Verification Sessions Allowed:
-
Specifies the maximum number of nested verification sessions
that are allowed. The LiveCycle server uses this value to prevent
an infinite loop. Infinite loops can occur while verifying the OCSP
or CRL signer certificates when the OCSP or CRL is not set up correctly.
The default value is
5
.
-
Maximum Clock Skew for Verification:
-
Specifies the maximum time, in minutes, that the signing
time can be after the validation time. If the clock skew is greater
than this value, the signature is not valid. The default value is
65
min.
-
Certificate Lifetime Cache (In Minutes):
-
Specifies the lifetime of a certificate, retrieved online
or through other means, in the cache. The default value is
1440
min.
Transport Options
-
Proxy Host:
-
Specifies the URL of the proxy host. A proxy host is only
used when some valid value is provided.
-
Proxy Port:
-
Specifies the port to use for the proxy. Valid port number
values are
0
–
65535
. The default
value is
80
.
-
Proxy Login Username:
-
Specifies the user name to use to log in to the proxy host.
This option is used when a valid Proxy Host and Proxy Port are configured.
-
Proxy Login Password:
-
Specifies the password to use to log in to the proxy host.
This option is used when a valid Proxy Host and Proxy Port are configured.
-
Maximum Download Limit:
-
Specifies the maximum amount of data, in megabytes, that
can be received per connection. Valid download limit values are
1
MB
to
1024
MB. The default value is
16
MB.
-
Connection Time Out:
-
Specifies the maximum time to wait, in seconds, for establishing
a new connection. Valid time-out values are
1
–
300
sec.
The default value is
5
.
-
Socket Time Out:
-
Specifies maximum time to wait, in seconds, before a socket
time-out (while waiting for data transfer) occurs. Valid time-out
values are
1 3600
– sec. The default value is
30
sec.
Path Validation Options
-
Require Explicit Policy:
-
Specifies whether the path must be valid for at least one
of the certificate policies that is associated with the trust anchor
of the signer certificate. By default, this value is not selected,
which means that no certificate policy is required to be associated with
the trust anchor of the signer certificate.
-
Inhibit ANY Policy:
-
Specifies whether the policy object identifier (OID) must
be processed if it is included in a certificate. By default, the
option is not selected, which means that the OID does not need to
be processed.
-
Inhibit Policy Mapping:
-
Specifies whether policy mapping is allowed in the certification
path. By default, the option is not selected, which means that policy
mapping is not allowed in the certification path.
-
Check All Paths:
-
Specifies whether all paths must be validated or validation
stops after finding the first valid path. By default, the option
is deselected, which means that validation stops after the first
valid path.
-
LDAP Server:
-
Specifies the URL or path of the LDAP server used to look
up certificates for path validation. For example, you can type
www.ldap.com
for
the URL or
ldap://ssl.ldap.com:200
for the path
and port.
-
Follow URIs in Certificate AIA:
-
Specifies whether Uniform Resource Identifiers (URIs) in
Certificate Authority Information Access (AIA) are processed during
path discovery. By default value, the option is not selected, which
means that during path discovery, do not process URIs in the AIA.
-
Basic Constraints Extension Required in CA Certificates:
-
Specifies whether the certificate authority (CA) Basic Constraints
certificate extension must be present for CA certificates. Some
early German certified root certificates (7 and earlier) are not
compliant to
RFC 3280
and do not contain the basic
constraint extension. If it is known that a user's EE certificate
chains up to such a German root, deselect this option. By default,
the option is selected, which means that the CA Basic Constraints
certificate must be present.
-
Require Valid Certificate Signature During Chain Building:
-
Specifies whether the chain builder requires valid signatures
on certificates used to build chains. When this option is selected,
the chain builder does not build chains with invalid Digital Signature
Algorithm (DSA) signatures on certificates. For example, in a chain
CA > ICA > EE where the signature for EE is not valid, the
chain building stops at ICA. EEs are not included in the chain.
This setting does not affect DSA signatures. By default, the option
is deselected, which means the full three-certificate chain is produced.
Timestamp Provider Options
-
TSP Server URL:
-
Specifies the URL of the default timestamp provider. This
option is not used when no value is provided.
-
TSP Server Username:
-
Specifies user name to use to access the timestamp provider.
This option is used when a value is provided for the TSP Server
URL option.
-
TSP Server Password:
-
Specifies the password to use to access the timestamp server.
This option is used when a value is provided for the TSP Server
Username and TSP Server URL options.
-
Request Hash Algorithm:
-
Specifies the hashing algorithm to use while creating the
request for the timestamp provider. Select one of the following
values:
-
SHA1:
(Default) The Secure Hash Algorithm
that has a 160-bit hash value.
-
SHA256:
The Secure Hash Algorithm that has a 256-bit hash
value.
-
SHA384:
The Secure Hash Algorithm that has a 384-bit hash
value.
-
SHA512:
The Secure Hash Algorithm that has a 512-bit hash
value.
-
RIPEMD160:
The RACE Integrity Primitives Evaluation Message
Digest that has a 160-bit message digest algorithm and is not FIPS-compliant.
-
Revocation Check Style:
-
Specifies the revocation-checking style used for determining
the trust status of the timestamp provider's certificate from its
observed revocation status. Select one of the following values:
-
NoCheck:
Does not check for revocation.
-
BestEffort:
Checks for revocation of all certificates
when possible.
-
CheckIfAvailable:
(Default) Checks for revocation
of all certificates only when revocation information is available.
-
AlwaysCheck:
Checks for revocation of all certificates.
-
Send Nonce:
-
Specifies whether a nonce is sent with the request. A
nonce
is
a parameter that varies with time. These parameters can be a timestamp,
a visit counter on a web page, or a special marker. The parameters
are intended to limit or prevent the unauthorized replay or reproduction
of a file. By default, the option is selected, which means that
a nonce is sent with the request.
-
Use Expired Timestamps During Validation:
-
Specifies whether to use a timestamp that has expired. The
default is selected, which means to use the time present in expired
timestamps during validation of the signature.
-
TSP Response Size:
-
Specifies the estimated size, in bytes, of the timestamp
server (TSP) response. This value represents the maximum size of
the timestamp response that the configured timestamp provider can
return. Configuring an undersized value can cause the operation
to fail and errors to be seen the server logs; however, configuring
an oversized value causes the size to be larger than necessary.
It is recommended that this value is not modified unless the timestamp
server requires a response size to be less than 4096 bytes. Do not
change this value unless you are certain what to change the value
to. Valid response sizes are
60B
to
10240B
.
The default value is
4096B
.
Certificate Revocation List Options
-
Consult Local URI
First:
-
Specifies whether the Certificate Revocation List (CRL) location
is provided in Local URI for CRL Lookup. The Local URI must have
preference over any location specified within a certificate for
revocation checking. By default, the option is deselected, which
means the locations are specified in the certificate before using
the local URI.
-
Local URI for CRL Lookup:
-
Specifies the URL of the local CRL provider. This value is
only used when the Consult Local URI First setting is selected.
-
Revocation Check Style:
-
Specifies the revocation-checking style used for determining
the trust status of the CRL provider's certificate from its observed
revocation status. Select one of the following values:
-
NoCheck:
Does not check for revocation.
-
BestEffort:
(Default) Checks for revocation of all
certificates when possible.
-
CheckIfAvailable:
Checks for revocation of all certificates only
when revocation information is available.
-
AlwaysCheck:
Checks for revocation of all certificates.
-
LDAP Server for CRL Lookup:
-
Specifies the URL or path of the Lightweight Directory Access
Protocol (LDAP) server used to retrieve information about the certificate
revocation list (CRL). The LDAP server searches for CRL information
using the distinguished name (DN) according to the rules specified
in
RFC 3280
, section 4.2.1.14. For example,
you can type
www.ldap.com
for the URL or
ldap://ssl.ldap.com:200
for
the path and port.
-
Go Online:
-
Specifies whether to access the network to retrieve CRL information.
CRL information is cached for optimal usage of the network. When
the option is deselected, it means not to go online. By default,
the option is selected, which means to access the network.
-
Ignore Validity Dates:
-
Specifies whether to ignore the response’s thisUpdate and
nextUpdate times, which prevents any negative effect times have
on response validity. The thisUpdate and nextUpdate times are external
sources that are retrieved through HTTP or LDAP and can be different
for each revocation information. When this option is selected, it
means to ignore the thisUpdate and nextUpdate times. By default,
this option is deselected, which means to use the thisUpdate and
nextUpdate times.
-
Require AKI Extension in CRL:
-
Specifies whether the Authority Key Identifier (AKI) extension
must be present in the CRL. The AKI extension can be used for CRL
validation. When the option is selected, it means that the AKI extension
must be present. By default, the option is deselected, which means
that the AKI extension does not have to be present.
Online Certificate Status Protocol Options
-
OCSP
Server URL:
-
Specifies the local URL, which is the location of the Online
Certificate Status Protocol (OCSP) server, which is the location
of the configured OCSP server. The value is only used when the LocalURL
or UseAIAIfPresentElseLocal values are in URL To Consult Option.
-
URL To Consult Option:
-
Specifies the list and order of the OCSP servers used to
perform the revocation check. Select one of the following values:
-
UseAIAInCert:
Use the URL of an online certificate status
protocol server specified in the Authority Information Access (AIA) extension
in the certificate.
-
LocalURL:
Use the specified URL for the OCSP server specified
in the OCSP Server URL option.
-
UseAIAIfPresentElseLocal:
Use the URL of the OCSP server
specified in the AIA extension in the certificate if present. If
the certificate is not present, use the URL configured in the OCSP
Server URL.
-
UseAIAInSignerCert:
(Default) Use the URL of the OCSP server
specified in the AIA extension in the OCSP request of the signer
certificate.
-
Revocation Check Style:
-
Specifies the revocation-checking style used for verifying
the trust status of the CRL provider’s certificate from its observed
revocation status. Select one of the following values:
-
NoCheck:
Does not check for revocation.
-
BestEffort:
Checks for revocation of all certificates
when possible.
-
CheckIfAvailable:
(Default) Checks for revocation
of all certificates only when revocation information is available.
-
AlwaysCheck:
Checks for revocation of all certificates.
-
Send Nonce:
-
Specifies whether a nonce is sent with the request. A
nonce
is
a parameter that varies with time. These parameters can be a timestamp,
a visit counter on a web page, or a special marker. The parameters
are intended to limit or prevent the unauthorized replay or reproduction
of a file. When the option is deselected, a nonce is not sent with the
request. By default, the option is selected, which means a nonce
is sent with the request.
-
Max Clock Skew Time:
-
Specifies the maximum allowed skew, in minutes, between response
time and local time. The minimum value is
0
and
the maximum value is
2147483647
min. The default
value is
5
min.
-
Response Freshness Time:
-
Specifies the maximum time, in minutes, for which a preconstructed
OCSP response is considered valid. Valid response freshness times
are
1
–
2147483647
min. The default
value is
525600
min. (one year).
-
Sign OCSP Request:
-
Specifies whether the OCSP request must be signed. When the
option is selected, it means that the OCSP request must be signed.
By default, the option is deselected, meaning that the OCSP request
is not required to be signed.
-
Request Signer Credential Alias:
-
Specifies the trust store credential alias to use for signing
the OCSP request if signing is enabled. The alias is used if the
Sign OCSP Request option is selected.
-
Go Online:
-
Specifies whether to access the network to retrieve OCSP
information. Embedded and cached OCSP responses are used on the
server to reduce the amount of network traffic generated due to OCSP
checking. When the option is deselected, OCSP information is not
retrieved from the network and only embedded and cached OCSP information
is used. By default, the option is selected, which means to access
the network for OCSP information.
-
Ignore the Response’s thisUpdate and nextUpdate Times:
-
Specifies whether to ignore the response’s thisUpdate and nextUpdate
times, which prevents any negative effect times have on response validity.
The thisUpdate and nextUpdate times are retrieved from external sources
by using HTTP or LDAP and can be different for each revocation information.
When the option is selected, it means to ignore the thisUpdate and nextUpdate
times. By default, the option is deselected, which means to use
the thisUpdate and nextUpdate times.
-
Allow OCSPNoCheck Extension:
-
Specifies whether the OCSPNoCheck extension is allowed in
the response signing certificate. An OCSPNoCheck extension can be
present in the OCSP Responder’s certificate to prevent infinite
loops from occurring during the validation process. When the option
is deselected, it means that the OCSPNoCheck extension is not allowed.
By default, the option is selected, which means the OCSPNoCheck extension
is allowed.
-
Require OCSP ISIS-MTT CertHash Extension:
-
Specifies whether a certificate public key hash extension
must be present in OCSP responses. This extension is required for
SigQ validation. SigQ compliance requires the CertHash extension
to be in the OCSP responder certificate. Select this option when
processing for SigQ compliance and supported OCSP responders. When
the option is selected, it means that the certificate public key
hash extension must be present. By default, the option is deselected, which
means that the presence of a certificate public key extensions is
not required.
Error Handling Options for Debugging
-
Purge Certificate
Cache on Next API Call:
-
Use this option for debugging purposes in a non-production environment.
Specifies whether to purge the certificate cache when the next Signature
service operation executes. When the option is selected, it means
that the certificate cache on the LiveCycle server is purged. By
default, the option is deselected, which means that the certificate
cache is not purged. After the first Signature operation executes,
the option becomes deselected.
-
Purge CRL Cache on Next API Call:
-
Use this option for debugging purposes in a non-production
environment. Specifies whether to purge the Certificate Revocation
List (CRL) cache when the next Signature service operation executes.
When the option is selected, it means that the CRL Cache on the
LiveCycle server is purged. By default, the option is deselected,
which means that the CRL cache on the LiveCycle server is not purged.
After the first Signature operation executes, the option becomes deselected.
-
Purge OCSP Cache on Next API Call:
-
Use this option for debugging purposes in a non-production
environment. Specifies whether to purge the Online Certification
Server Protocol (OCSP) cache when the next Signature service operation
executes. When the option is selected, it means that the OCSP Cache
on the LiveCycle server is purged. By default, the option is deselected,
which means that the OCSP cache is not purged. After the first Signature
operation executes, the option becomes deselected.
|
|
|