Uploaded image for project: 'RHEL'
  1. RHEL
  2. RHEL-11769

Issue creating certmapping for smartcards

    • Icon: Bug Bug
    • Resolution: Unresolved
    • Icon: Normal Normal
    • None
    • rhel-8.9.0, rhel-9.3.0
    • sssd
    • None
    • Important
    • rhel-sst-idm-sssd
    • ssg_idm
    • 0
    • False
    • Hide

      None

      Show
      None
    • None
    • Red Hat Enterprise Linux
    • None
    • None
    • None
    • All
    • None

      What were you trying to do that didn't work?

      When selecting Login using certificate on the ipa/ui login page:

      The modified value works (note the comma before CN):
      X509:<I>C=US,O=U.S. Government,OU=NASA,OU=Certification Authorities,OU=NASA Operational CA<S>C=US,O=U.S. Government,OU=nasa,OU=People,OID.0.9.2342.19200300.100.1.1=tmberry,CN=THOMAS BERRY (affiliate)

      The original AD generated value fails (note the space before CN):
      X509:<I>C=US,O=U.S. Government,OU=NASA,OU=Certification Authorities,OU=NASA Operational CA<S>C=US,O=U.S. Government,OU=nasa,OU=People,OID.0.9.2342.19200300.100.1.1=tmberry CN=THOMAS BERRY (affiliate)

      This value is produced by NASA and is intended to be applied to altSecurityIdentities across NASA Active Directory systems; JPL has successfully applied this value to its Active Directory.

      Here is the Certificate Identity Mapping Rule:
      Mapping rule: (ipacertmapdata=X509:<I>{issuer_dn!ad_x500}<S>{subject_dn!ad_x500})
      Matching rule: <ISSUER>OU=NASA Operational CA,OU=Certification Authorities,OU=NASA,O=U.S. Government,C=US

       

              sbose@redhat.com Sumit Bose
              rhn-support-jwooten Joel Wooten
              SSSD Maintainers SSSD Maintainers
              Scott Poore Scott Poore
              Votes:
              0 Vote for this issue
              Watchers:
              5 Start watching this issue

                Created:
                Updated: