-
Notifications
You must be signed in to change notification settings - Fork 137
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[RFE] Unable to issue certificate on clone with LWCA #2956
Comments
Comment from edewata (@edewata) at 2017-10-18 12:58:52 Manual transfer using PKCS 12 file:
$ pki -d /etc/pki/pki-tomcat/alias/ -c Secret.123 pkcs12-cert-add "ca_signing e4b98e40-4b66-40ee-addd-bc4202b5a107" --pkcs12-file subca.p12 --pkcs12-password Secret.123
$ pki -d /etc/pki/pki-tomcat/alias/ -c Secret.123 pkcs12-import --pkcs12-file subca.p12 --pkcs12-password Secret.123
|
Comment from edewata (@edewata) at 2017-10-18 12:58:54 Metadata Update from @edewata:
|
Comment from mharmsen (@mharmsen) at 2017-10-18 19:01:22 Metadata Update from @mharmsen:
|
Comment from ftweedal (@frasertweedale) at 2017-10-18 21:28:42 This is not a bug but an RFE. With IPA we configure Dogtag to use custodia to retrieve the So essentially this ticket would be about revisiting how we want LWCA key replication to occur in non-IPA PKI deployments (or asking the question again about whether we want to support this |
Comment from mharmsen (@mharmsen) at 2017-10-25 12:12:51 [20171025] edewata, frasertweedale - FUTURE RFE |
Comment from mharmsen (@mharmsen) at 2017-10-25 12:12:52 Metadata Update from @mharmsen:
|
Comment from ftweedal (@frasertweedale) at 2017-11-15 02:06:52 FUTURE usually means NEVER, so I'm going to close this WONTFIX. In the IPA context (which is the only context in which we currently support lightweight CAs) the key replication gets configured. So I'm going to close this WONTFIX. We can reopen if someone is really kicking and screaming for this. |
Comment from ftweedal (@frasertweedale) at 2017-11-15 02:06:53 Metadata Update from @frasertweedale:
|
Comment from mharmsen (@mharmsen) at 2017-11-15 11:02:47 Metadata Update from @mharmsen:
|
Comment from edewata (@edewata) at 2017-11-15 11:29:47 Added a note about this limitation in this page: |
Comment from ftweedal (@frasertweedale) at 2017-11-16 04:03:15 Thanks @edewata ! |
This issue was migrated from Pagure Issue #2836. Originally filed by edewata (@edewata) on 2017-10-18 12:14:36:
In non-IPA environment, issuing a certificate on clone with lightweight sub CA does not work because the sub CA certificate does not automatically get transferred to the clone.
Steps to reproduce:
Actual result: The approval will fail with the following message:
Expected result: The approval should succeed. If it requires additional manual process, there should be a proper documentation for that.
Note: The NSS database on master has the sub CA certificate, but the clone does not. Ideally it should have been transferred automatically to the clone.
See also:
The text was updated successfully, but these errors were encountered: