Uploaded image for project: 'RHEL'
  1. RHEL
  2. RHEL-4913

Check hidden status for PKINIT certificate creation

    • ipa-4.9.13-12.module+el8.10.0+22138+e77d88cf
    • None
    • None
    • 1
    • rhel-sst-idm-ipa
    • ssg_idm
    • 5
    • False
    • Hide

      None

      Show
      None
    • No
    • 2024-Q3-Bravo-S3
    • If docs needed, set a value
    • None

      Description of problem:
      ipa-pkinit-manage disable > remove kdc cert > ipa-pkinit-manage enable solution doesn't work correctly for hidden replica, because IPA doesn't consider replica status for this process, and hidden replica isn't a public KDC.

      Version-Release number of selected component (if applicable):
      ipa-server-common-4.9.8-7.module+el8.6.0+14337+19b76db2.noarch
      certmonger-0.79.13-5.el8.x86_64

      How reproducible:
      Always

      Steps to Reproduce:
      1. Install replica
      2. Make it hidden with # ipa server-state $HOSTNAME --state=hidden
      3. Try to renew cert, either with certmonger resumbission or ipa-pkinit-manage disable > remove kdc cert > pkinit enable

      Actual results:
      You end up with self-signed certificate even for replica with CA.

      Expected results:
      Either get an informative error (proposing using ipa server-state $HOSTNAME --state=active to do the same) or request the cert from other PKIs

      Additional info:

              frenaud@redhat.com Florence Renaud
              rhn-support-asharov Aleksandr Sharov
              Florence Renaud Florence Renaud
              Michal Polovka Michal Polovka
              Votes:
              0 Vote for this issue
              Watchers:
              6 Start watching this issue

                Created:
                Updated:
                Resolved: