Uploaded image for project: 'RH-SSO'
  1. RH-SSO
  2. RHSSO-1724

[GSS](7.3.z) Provide a way to set a responder certificate in OCSP/X509 Authenticator

XMLWordPrintable

      The RFC for OCSP 6960 states in chapter 2.2 Response the following:

      All definitive response messages SHALL be digitally signed. The 
      key used to sign the response MUST belong to one of the following:
      
         - the CA who issued the certificate in question
         - a Trusted Responder whose public key is trusted by the requestor
         - a CA Designated Responder (Authorized Responder, defined in
           Section 4.2.2.2) who holds a specially marked certificate issued
           directly by the CA, indicating that the responder may issue OCSP
           responses for that CA
      

      The second option lets the OCSP use any certificate to sign the responses but the client should know that certificate (public key) in advance. Current X509 implementation in keycloak does not provide a way of setting that responder certificate (only the other two options of the specification are used right now).

      When the responder URI is explicitly specified in any OCSP configuration (not using distribution endpoints in the client certificate), setting a responder certificate is very common.

              hmlnarik@redhat.com Hynek Mlnařík (Inactive)
              rhn-support-rmartinc Ricardo Martin Camarero
              Votes:
              1 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated:
                Resolved: