-
Story
-
Resolution: Done-Errata
-
Undefined
-
rhel-8.8.0
-
idm-DL1-8100020250404183236.823393f5
-
None
-
1
-
rhel-idm-ipa
-
ssg_idm
-
2
-
False
-
False
-
-
No
-
2025-Q2-Alpha-S1
-
Pass
-
Automated
-
If docs needed, set a value
-
-
Unspecified
-
None
-
57,005
Description of problem:
If externally signed CA cert is expired, the ipa-cert-fix will proceed with issuing new service and shared certificates using it, that produces certificates with very short validity periods. If that's the case, the situation gets worse than before ipa-cert-fix - we can't return in time to operate normally in this case.
Version-Release number of selected component (if applicable):
ipa-server-4.9.11-5
How reproducible:
always, if you have expired externally signed CA
Steps to Reproduce:
1. expire your externally-signed CA cert
2. run ipa-cert-fix
Actual results:
system is broken and requires manual search for previous certs in LDAP repository in order to get operational again
Expected results:
check is run if CA is externally signed and if it is expired, and if that's the case - ipa-cert-fix doesn't perform any action (renewal not possible until new CA cert is signed)
Additional info:
- external trackers
- links to
-
RHBA-2025:147225 idm:client bug fix and enhancement update