Configure EJBCA for Public Access

An RA or CA can be configured for public access using a PublicAccessAuthenticationToken . This allows anyone to navigate to /ejbca/ra and /ejbca/adminweb respectively without having to present a certificate.

You can configure EJBCA for public access either using the Admin Web or the EJBCA CLI.

To configure EJBCA public access, go to /ejbca/adminweb/administratorprivileges/roles.xhtml and add a new member to any role. The member should have Match with set to one of the following:

  • PublicAccessAuthenticationToken : Any transport (HTTP or HTTPS)

  • PublicAccessAuthenticationToken: Non-confidential transport (HTTP)

  • PublicAccessAuthenticationToken: Confidential transport (HTTPS)

To configure EJBCA for public access using the CLI, run the following:

./ roles addrolemember --caname "" --role "Super Administrator Role" --value "" --with PublicAccessAuthenticationToken:TRANSPORT_ANY

This will disable client certificate authentication in EJBCA for the RA. The CA Web (/ejbca/adminweb) will still require a certificate unless you compile EJBCA with web.reqcert=false in conf/

Disabling client certificate checks for the CA web is a really good way to get completely pwnd/hacked/compromised and render any support contract invalid. Make sure you know what you're doing before you disabling the web.reqcert property.