EzSign Management Tool
The Management utility enables the following operations:
- Setting of Token Passwords
- Generation of CSRs (Certificate Signing Requests)
- Specifying Signing Keys
- Importing Certificates
- Importing existing HSM keys
- Deleting Certificates
- Displaying Certificates
- Generating AES Keys
- Displaying AES Keys
- Deleting AES Keys
- Translating Keystore Objects from an old password to new
- Setting the Authentication Code
- Setting TLS Passphrases
The server will not start until the token passwords have been set and you will be unable to sign or verify signatures until the required keys and certificates have been generated and imported. Encrypting and decrypting requires an AES key to be generated. Therefore, the Management tool must usually be run before the server can be started (if you are duplicating configurations there is no need to re-run the tool)
Starting
To start the management utility, run the following script which requires that the server properties file is passed as a parameter e.g.
ezsign-manage.sh server.properties
(On Windows run ezsign-manage.bat)
Once the script starts you will be asked to enter the Master Password before being able to proceed
Krestfield EzSign Management
----------------------------
The master password is required to manage the server
Enter password:
Type the Master Password and press enter. This will then display the menu:
Krestfield EzSign Management
----------------------------
1. Set Passwords
2. Generate CSR
3. Import Certificate
4. Import Existing HSM Keys
5. Set Signing Key
6. Display Certificates
7. Display Certificates Details
8. Delete Certificate
9. Generate AES Key
10. Display AES Keys
11. Delete AES Key
12. Translate Keystore Objects
13. Display all Channel Objects
14. Set Authentication Code
15. Set TLS Client Keystore Password
16. Set TLS Trust Keystore Password
17. Exit
Command:
Setting Master and Token Passwords
To set the Master and Token passwords for a channel choose option 1. You will then be prompted to choose the channel, enter the Master Password and Token Passwords and then whether you want to write the new data to the properties file. This option must be run before the server is started in order to encrypt the Token Passwords
Channels
--------
1. TEST
2. TechTest1
3. TechTest2
Select Channel Number: 1
Master Password
---------------
This is the password which is used to start the server
It is used to encrypt other passwords (Token Passwords etc). It is not stored
Enter Password:
Retype Password:
Token Password
--------------
For software tokens, this is the password used to encrypt keys
For PKCS#11 tokens, this is the token PIN/Password used to authenticate,
also referred to as the operator password
For HSM9000 tokens, this is password is used to re-encrypt the local keys
(although they are already encrypted under the HSM Master Key)
This password is stored in the configuration, encrypted under the master password
Enter Password:
Retype Password:
A backup of the original has been saved to ..\test.properties.2026.01.12.09.03
Ready to update properties file ..\test.properties with the new passwords
Proceed? (y/n): y
The properties file ..\test.properties has been updated successfully.
Note: For sensitive operations including:
- Generating CSRs
- Importing certificates
- Deleting certificates
- Setting the signing key
- Generating AES keys
- Deleting AES keys
The channels token password will be required. When required you will receive a prompt as follows:
The token password is required for this operation. Please enter the token password below
Token Password:
The token password must then be entered to proceed
Generating a CSR
To generate a CSR (Certificate Signing Request) choose option 2. You will be prompted to enter the selected channel again, then requested DN (Distinguished Name), key size and the filename to store the CSR
Generating CSR for channel TEST
Distinguished Name: CN=Test,O=Krestfield Ltd,C=GB
CSR Filename: krestfield.p10
Generated CSR Data:
-----BEGIN CERTIFICATE REQUEST-----
MIICYTCCAUkCAQAwHjEPMA0GA1UEAwwGVGVzdC5PMQswCQYDVQQGEwJHQjCCASIwDQYJKoZIhvcN
AQEBBQADggEPADCCAQoCggEBAIMvY7RaJtHTz2jB7Nfqb2OLANmjOqACybd5FSlwFxvCSjTzoRoG
Y97aFWldDHueyVLmKKJtYMScTIs1gZSvm9guUpOhVsvQ0KaX58ZFMmRvlmeBlP2rbQIe0F1Fp724
XggI/5dXr9OKVbdIWrJkZTsFYn8bXU7nY1MAuRl5NK6CSkl6XZTvODRezL9ioFmkE09EWP4wIKyQ
zQW0Z/mn7a51eiJA+utBf3MgtUkmEzTc8Z73xrGflwt0fCnghs1gXnHNlZMkiR3l1iOPV/ppQ9l2
FsVv85JFk4eMJxP1cp+niEtoTFIc49JF/nB4u+B1aslnBBimn2oMzD/gItOdCc0CAwEAATANBgkq
hkiG9w0BAQsFAAOCAQEAYh4erwAkHL+ZuHMRcOmufK9ZJCxLXgbF2DjCgCC53xMuNwiQ7wIL6at6
N1jK8v4WlIaRE1WRSOO7k7OG3MwXBtDy3oVmr5NWEKu0WSVbwM/7mVjkczuBxLXdr/pEeyH9Nm02
h3kH0sO25xt5BjoCzcoHIYmmHxa5tyzjchqTE5Fw68S/7rusodvAbEwNKYQQhHTCwAzuusGDxb0D
+JHNTk63zenDHw56pcURsvmA16BSXF30MatVcoTd7elqmAho+yUm0c0CVOfGoH2zFv7jcyl8jDtm
w3Kg45sND7L2A9hII0QGy3L+seE/GpMaoxhhDBPxbIfAkqecxyapA+aX3w==
-----END CERTIFICATE REQUEST-----
CSR written to krestfield.p10
The CSR should then be processed by the CA who will issue the certificate. Once the certificate has been issued the Import Certificate option can be chosen to import the certificates
Importing Certificates
To import root certificates or certificates issued from a CSR choose option 3. You will then be prompted for the channel and a path to the certificate.
Channels
--------
1. TEST
Select Channel Number: 1
Path to certificate: /opt/ezsign/certs/signing.cer
Certificate imported successfully
if the certificate is associated with a private key on the token, you will also be prompted if you wish to set this as the new signing certificate:
Do you wish to set this as the default signing certificate? (y/n): y
A backup of the original has been saved to ..\samples\test.properties.2026.01.12.11.00
Ready to update properties file ..\samples\test.properties with the new passwords
Proceed? (y/n): y
The properties file ..\samples\test.properties has been updated successfully.
Choosing y will result in the properties file being updated. If you do not wish to set this as the signing certificate now, you can do this later by running option 5. Set Signing Key
Note that for signing certificates, all certificates in the path must be imported
Importing Existing Keys and Certificates
If you are using a PKCS#11 HSM which has been used by another system you may import these objects into EzSign. To do this choose option 4.Import Existing HSM Keys
Choose the channel to import the objects to. Note: the channel selected must be configured to use the HSM from which the objects are to be imported
If not previously entered, you will be prompted for the token password:
The token password is required for this operation. Please enter the token password
below
Token Password:
Password verified OK
Importing objects from the HSM...
Objects imported from the HSM OK
The objects imported can be examined by running the Display Certificates or Display all Channel Objects options. The signing key can be selected by running the Set Signing Key option
Setting the Signing Key
To set the default signing key (that is the key that will be used to sign data), choose option 5. You will then be presented with a list of available certificates which have associated private keys and can therefore be used to sign data. Note: a certificate will not be available for signing if there is not a complete path for that certificate
Current Signing Certificate:
----------------------------
Subject: CN=Test Cert 1, O=Krestfield Ltd, C=GB
Issuer : CN=Krestfield Test CA, OU=Engineering, O=Krestfield Ltd, C=GB
Valid From: Wed Oct 12 08:12:48 BST 2026
Valid To : Thu Oct 12 08:12:48 BST 2027
Serial Number: 5b000000348a17f73059f07217000000000034
Available Signing Certificates:
-------------------------------
1. Subject: CN=Test Cert 2, O=Krestfield Ltd, C=GB
Issuer : CN=Krestfield Test CA, OU=Engineering, O=Krestfield Ltd, C=GB
Valid From: Wed Nov 12 18:12:48 BST 2026
Valid To : Thu Nov 12 18:12:48 BST 2027
Serial Number: 5b000000348a17f73059f07217000002010F13
Select Certificate Number: 1
A backup of the original has been saved to ..\test.properties.2016.10.12.09.28
Ready to update properties file ..\test.properties with the new passwords
Proceed? (y/n): y
The properties file ..\test.properties has been updated successfully.
Displaying and Deleting Certificates
Options 6, 7 and 8 are used to delete and display the available certificates. When certificates are displayed they are shown in the following format
Current Signing Certificates:
-----------------------------
1. Subject: CN=Test 1, O=Krestfield Ltd, C=GB
Issuer : CN=Krestfield Test CA2, OU=Engineering, O=Krestfield Ltd, C=GB
Valid From: Wed Oct 12 08:12:48 BST 2016
Valid To : Thu Oct 12 08:12:48 BST 2017
Serial Number: 5b000000348a17f73059f07217000000000034
2. Subject: CN=Krestfield Test CA2, OU=Engineering, O=Krestfield Ltd, C=GB
Issuer : CN=Krestfield Test Root CA2, OU=Engineering, O=Krestfield Ltd, C=GB
Valid From: Fri Dec 04 08:22:54 GMT 2015
Valid To : Thu Nov 29 08:22:54 GMT 2035
Serial Number: 3e00000002254212210f37d14f000000000002
3. Subject: CN=Krestfield Test Root CA2, OU=Engineering, O= Krestfield Ltd, C=GB
Issuer : CN=Krestfield Test Root CA2, OU=Engineering, O= Krestfield Ltd, C=GB
Valid From: Thu Dec 03 09:13:47 GMT 2015
Valid To : Wed Dec 03 09:23:47 GMT 2036
Serial Number: 5de549fbaf4b14b141d63d3c631b27c0
Other Certificates:
-------------------
4. Subject: CN=Krestfield Test Root CA1, OU=Engineering, O=Krestfield Ltd, C=GB
Issuer : CN=Krestfield Test Root CA1, OU=Engineering, O=Krestfield Ltd, C=GB
Valid From: Thu Nov 03 09:13:47 GMT 2015
Valid To : Wed Nov 03 09:23:47 GMT 2036
Serial Number: 5de549abaf4b14b141d63d3c631bde54
The first section displays the Current Signing Certificates. This is based on the selected signing key and displays the complete path.
The second sections displays all other certificates which are stored but not included in the current signing path
Generating AES Keys
Choose option 9 to generate an AES key. Enter the key size and the key label as follows:
Enter AES Key Size (128, 192 or 256): 256
Enter a unique label for this key: key10
AES key generated OK
Once the key has been created it can be used to encrypt and decrypt data via the client, where the label set above must be specified to select this key
Displaying and Deleting AES Keys
AES keys can be displayed and deleted by choosing options 10 and 11
Current AES Keys:
-----------------------------
# Key Size Date Created Label
--- -------- ------------------- --------
1 128bits 11-3-2017 17:16:45 key2
2 256bits 13-3-2017 21:33:00 testkey5
3 192bits 11-3-2017 17:14:52 key1
4 256bits 19-3-2017 09:20:26 key10
5 256bits 11-3-2017 17:17:05 key3
Key details will be shown including the key size, date created and associated label
Translate KeyStore Objects
If you wish to translate keystore objects from one token password to another. For example, when refreshing passwords for software tokens or if an HSM’s objects have been translated to another operator cardset, choose option 12
You will be prompted to choose the channel and then enter the current token password
Please enter the current token password
Enter Password:
Retype Password:
Then enter the new token password. This is the new password or new operator cardset passphrase:
Please enter the NEW token password
Enter Password:
Retype Password:
Objects have been translated to the new password successfully
A backup was made of the original objects and stored in the SIGN keystore folder
The objects will be translated and re-encrypted under the new password. The pre-translated objects will be backed up to a timestamped folder within the keystore directory e.g. /20261101_1015_BACKUP
Display KeyStore Objects
To display all the objects stored within a channel, select option 13, then enter the channel
All objects details will be displayed indicating what type of object they are (i.e. private key, certificate etc), the ID and filename e.g.
Current Objects:
----------------
Object ID: 15fbc93ade39910
Created : Tue Nov 14 22:08:35 GMT 2026
Type : CERTIFICATE
Subject: CN=Krestfield CA, OU=PKI Services, O=Krestfield Ltd, C=GB
Issuer : CN=Krestfield Root, OU=PKI Services, O=Krestfield Ltd, C=GB
Serial Number: 380000000e3308b4434ca3142100000000000e
Filename : 15fbc93ade39910.cer
Object ID: 15fbc93956f0472
Created : Tue Nov 14 22:08:29 GMT 2026
Type : CERTIFICATE
Subject: CN=Krestfield Root, OU=PKI Services, O=Krestfield Ltd, C=GB
Issuer : CN=Krestfield Root, OU=PKI Services, O=Krestfield Ltd, C=GB
Serial Number: 5f0609d62d60709e45c1051774a13021
Filename : 15fbc93956f0472.cer
Object ID: PRVK:CC035985F170B51460A3B659523A8D757AD0CBCD
Created : Thu Apr 05 22:03:12 BST 2026
Type : PRIVATE KEY
Filename : PRVK_CC035985F170B51460A3B659523A8D757AD0CBCD.priv
Object ID: PUBK:13996A889E52A844660D083D631EE0F30405C576
Created : Tue Nov 14 22:08:35 GMT 2026
Type : CERTIFICATE
Subject: CN=SSAS Cert, O=Krestfield, C=GB
Issuer : CN=Krestfield CA, OU=PKI Services, O=Krestfield Ltd, C=GB
Serial Number: 450000000716edae60376f2200000000000007
Filename : PUBK_13996A889E52A844660D083D631EE0F30405C576.cer
Set Authentication Code
To set the authentication code which is used to encrypt traffic between the client and server, choose option 14
Enter the master password, followed by the authentication code:
You will now be asked to enter the Master Password
Followed by the Authentication Code Password
Master Password
---------------
This is the password which is used to start the server
It is used to encrypt other passwords (Token Passwords etc). It is not stored
Enter Password:
Retype Password:
Enter the Authentication Code
-----------------------------
This is a password used to secure traffic from the client to the server
Once this has been set, the client must provide this same password to the EzSign client
Enter Password:
Retype Password:
You will now be prompted whether to set this as the server code only (i.e. securing comms between the client and the server when sending messages), as the server control code only (i.e. securing comms between the client utils scripts and the control server) or both:
Do you want to set this password as the:
1. Server Authentication Code
2. Server Control Authentication Code
3. Both
4. Cancel
Enter Choice: 1
A backup of the original has been saved to ..\config\config.properties.2026.01.05.12.23
The server configuration will be updated and a backup made
Setting TLS Keystore Passwords
If utilising TLS to communicate with an HSM (e.g. a payShield) then you will need to configure a Trust Key Store (a key store where the CA certificates are stored) and optionally a Client Key Store (that will hold the client authentication certificate)
Select options 15 and 16 to set these passwords