Uploaded image for project: 'RHEL'
  1. RHEL
  2. RHEL-86320

[RFE] Support updating/renewing TLS certificate without restarting slapd

Linking RHIVOS CVEs to...Migration: Automation ...Sync from "Extern...XMLWordPrintable

    • rhel-idm-ds
    • 0
    • False
    • False
    • Hide

      None

      Show
      None
    • Yes
    • None
    • None
    • Automated
    • Enhancement
    • Hide
      Feature, enhancement:On line server certificate refresh
      Reason: allow to automatize the certificate renewal without having to stop the service
      Result: Administrator could generate the new certificate(s) then replace them, then use "dsconf instancveName config refresh-certs" to start using the new certificates.
      Beware although the existing ldap connection are not explicitly closed
       if the CA certificate has changed, the existing ldaps connections tend to get closed with SERVER_DOWN error because it expects the old certificate but the server renegotiate the encryption using the new certificate
      Show
      Feature, enhancement:On line server certificate refresh Reason: allow to automatize the certificate renewal without having to stop the service Result: Administrator could generate the new certificate(s) then replace them, then use "dsconf instancveName config refresh-certs" to start using the new certificates. Beware although the existing ldap connection are not explicitly closed  if the CA certificate has changed, the existing ldaps connections tend to get closed with SERVER_DOWN error because it expects the old certificate but the server renegotiate the encryption using the new certificate
    • Proposed
    • Unspecified
    • Unspecified
    • Unspecified
    • None

      Goal

      Explanation of Cu case:
      I'm hoping however that it would be possible for RHDS to support some method of reloading the TLS certificate/key without stopping and restarting the service. If not via something simple like SIGHUP, perhaps a task entry like reloading the schema could trigger slapd to reload the TLS key & certificate and then use it for new client connections.

      (This would enable something using a ACME renewal process to call a helper script to easily update the certificate and make it active without needing to coordinate the process across the pool of load-balanced replicas and wait to drain connections from the instance.)

      Acceptance criteria

      A list of verification conditions, successful functional tests, or expected outcomes in order to declare this story/task successfully completed.

      • Renew certificate
      • Have alternatives for admins other than the currently expected, # dsctl instance_name restart

              idm-ds-dev-bugs IdM DS Dev
              rhn-support-jabsher Jeremy Absher
              IdM DS Dev IdM DS Dev
              IdM DS QE IdM DS QE
              Evgenia Martyniuk Evgenia Martyniuk
              Votes:
              0 Vote for this issue
              Watchers:
              6 Start watching this issue

                Created:
                Updated: