-
Bug
-
Resolution: Done-Errata
-
Minor
-
rhel-8.6.0
-
ipa-4.9.13-12.module+el8.10.0+22138+e77d88cf
-
None
-
None
-
1
-
rhel-sst-idm-ipa
-
ssg_idm
-
5
-
False
-
-
No
-
2024-Q3-Bravo-S3
-
Pass
-
Automated
-
If docs needed, set a value
-
-
Unspecified
-
None
Description of problem:
ipa-pkinit-manage disable > remove kdc cert > ipa-pkinit-manage enable solution doesn't work correctly for hidden replica, because IPA doesn't consider replica status for this process, and hidden replica isn't a public KDC.
Version-Release number of selected component (if applicable):
ipa-server-common-4.9.8-7.module+el8.6.0+14337+19b76db2.noarch
certmonger-0.79.13-5.el8.x86_64
How reproducible:
Always
Steps to Reproduce:
1. Install replica
2. Make it hidden with # ipa server-state $HOSTNAME --state=hidden
3. Try to renew cert, either with certmonger resumbission or ipa-pkinit-manage disable > remove kdc cert > pkinit enable
Actual results:
You end up with self-signed certificate even for replica with CA.
Expected results:
Either get an informative error (proposing using ipa server-state $HOSTNAME --state=active to do the same) or request the cert from other PKIs
Additional info: