I have been trying for several days to get a server up with certs from an 
Internal CA at work.    I have 

We won't be using the IPA CA features.   I just want to protect the https and 
ldaps connections.  I have a server cert in pkcs7 format.
My understanding is that I want to install with a pkcs12 file and pin that 
contains the server cert, key, and CA cert chain.   (I have a rool and 
intermediate chain cert for the Internal CA).

I'm also assuming that I will be setting enable_ra = False in 
/etc/ipa/default.conf

My questions are:
- Does anyone have an example of preparing the pkcs12 file from server cert and 
*.pem files for the CA?    How can I check it for correctness? 
- Do I install normally and use the --http_pkcs12 and --dirsrv_pkcs12 options?  
 (I found some dated instructions on sectigo.com that discuss using the 
--self-signed option on the installer, which is no longer there)

_______________________________________________
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to