Hi Florence,

Thank you for your response. What does it mean if I run the ipa
certprofile-show command as outlined above and it just hangs? I don't think
there is any other way to see the settings you mentioned unless this
command is able to run right?

Many thanks,

Evan

On Fri, Sep 15, 2023 at 3:19 AM Florence Blanc-Renaud <f...@redhat.com>
wrote:

> Hi,
> it seems that PKI is not happy with the subject name of the certificates.
> The failing certs are for KDC, dirsrv and httpd and they all use the same
> subject name constraint in their profile.
>
> 1. Was any certificate profile modified (caIPAserviceCert or
> KDCs_PKINIT_Certs)? You can use
> ipa certprofile-show <name> --out /dev/stdout
> And then check the part related to Subject Name Constraint. In my default
> installation, I have
> policyset.serverCertSet.1.constraint.class_id=subjectNameConstraintImpl
> policyset.serverCertSet.1.constraint.name=Subject Name Constraint
> policyset.serverCertSet.1.constraint.params.accept=true
> policyset.serverCertSet.1.constraint.params.pattern=CN=[^,]+,.+
> policyset.serverCertSet.1.default.class_id=subjectNameDefaultImpl
> policyset.serverCertSet.1.default.name=Subject Name Default
> policyset.serverCertSet.1.default.params.name=CN=$
> request.req_subject_name.cn$, O=IPA.TEST
>
> which means that the subject name should match CN= followed by (anything
> except a comma) multiple times then a comma and any char multiple times.
>
> 2. If the profile wasn't changed, can you check in
> /var/log/pki/pki-tomcat/ca/debug.$DATE.log the received certificate
> request? Does its subject match the pattern? The error message
> java.lang.StringIndexOutOfBoundsException: String index out of range: -1
> hints that an expected pattern was not found.
>
> flo
>
> On Thu, Sep 14, 2023 at 4:11 PM Evan G via FreeIPA-users <
> freeipa-users@lists.fedorahosted.org> wrote:
>
>> Hi Rob,
>>
>> When we start tomcat with the date rolled back, we are not seeing any
>> errors at all. All of the ipa services start up without issue. The problem
>> is in actually renewing the certs, when we do so we have seen many
>> different errors as we've been troubleshooting -- mostly this one:
>> `ca-error: Server at https://<HOSTNAME>/ipa/xml failed request, will
>> retry: 4035 (RPC failed at server.  Request failed with status 500: Non-2xx
>> response from CA REST API: 500. String index out of range:
>> -1).[02/Aug/2023:00:00:31][ajp-bio-127.0.0.1-8009-exec-2]: EnrollProfile:
>> populate: begins`
>>
>> When I restart certmonger after all services up, these are the errors
>> that I am seeing in the tomcat debug logs:
>> ```
>> [02/Aug/2023:00:00:31][ajp-bio-127.0.0.1-8009-exec-2]: BasicProfile:
>> populate: policy setid =serverCertSet
>> [02/Aug/2023:00:00:31][ajp-bio-127.0.0.1-8009-exec-2]: EnrollDefault:
>> populate: SubjectNameDefault: start
>> java.lang.StringIndexOutOfBoundsException: String index out of range: -1
>>         at java.lang.String.substring(String.java:1967)
>>         at
>> com.netscape.certsrv.pattern.Pattern.substitute2(Pattern.java:132)
>>         at
>> com.netscape.cms.profile.def.EnrollDefault.mapPattern(EnrollDefault.java:815)
>>         at
>> com.netscape.cms.profile.def.SubjectNameDefault.populate(SubjectNameDefault.java:160)
>>         at
>> com.netscape.cms.profile.def.EnrollDefault.populate(EnrollDefault.java:226)
>>         at
>> com.netscape.cms.profile.common.BasicProfile.populate(BasicProfile.java:1114)
>>         at
>> com.netscape.cms.profile.common.EnrollProfile.populate(EnrollProfile.java:2626)
>>         at
>> com.netscape.cms.servlet.cert.CertProcessor.populateRequests(CertProcessor.java:379)
>>         at
>> com.netscape.cms.servlet.cert.EnrollmentProcessor.processEnrollment(EnrollmentProcessor.java:188)
>>         at
>> com.netscape.cms.servlet.cert.EnrollmentProcessor.processEnrollment(EnrollmentProcessor.java:96)
>>         at
>> com.netscape.cms.servlet.cert.CertRequestDAO.submitRequest(CertRequestDAO.java:197)
>>         at
>> org.dogtagpki.server.ca.rest.CertRequestService.enrollCert(CertRequestService.java:155)
>>         at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>>         at
>> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>>         at
>> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>>         at java.lang.reflect.Method.invoke(Method.java:498)
>>         at
>> org.jboss.resteasy.core.MethodInjectorImpl.invoke(MethodInjectorImpl.java:137)
>>         at
>> org.jboss.resteasy.core.ResourceMethodInvoker.invokeOnTarget(ResourceMethodInvoker.java:280)
>>         at
>> org.jboss.resteasy.core.ResourceMethodInvoker.invoke(ResourceMethodInvoker.java:234)
>>         at
>> org.jboss.resteasy.core.ResourceMethodInvoker.invoke(ResourceMethodInvoker.java:221)
>>         at
>> org.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:356)
>>         at
>> org.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)
>>         at
>> org.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)
>>         at
>> org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)
>>         at
>> org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)
>>         at javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
>>         at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>>         at
>> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>>         at
>> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>>         at java.lang.reflect.Method.invoke(Method.java:498)
>>         at
>> org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)
>>         at
>> org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)
>>         at java.security.AccessController.doPrivileged(Native Method)
>>         at javax.security.auth.Subject.doAsPrivileged(Subject.java:549)
>>         at
>> org.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)
>>         at
>> org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:175)
>>         at
>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:297)
>>         at
>> org.apache.catalina.core.ApplicationFilterChain.access$000(ApplicationFilterChain.java:55)
>>         at
>> org.apache.catalina.core.ApplicationFilterChain$1.run(ApplicationFilterChain.java:191)
>>         at
>> org.apache.catalina.core.ApplicationFilterChain$1.run(ApplicationFilterChain.java:187)
>>         at java.security.AccessController.doPrivileged(Native Method)
>>         at
>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:186)
>>         at
>> org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)
>>         at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>>         at
>> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>>         at
>> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>>         at java.lang.reflect.Method.invoke(Method.java:498)
>>         at
>> org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)
>>         at
>> org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)
>>         at java.security.AccessController.doPrivileged(Native Method)
>>         at javax.security.auth.Subject.doAsPrivileged(Subject.java:549)
>>         at
>> org.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:320)
>>         at
>> org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:260)
>>         at
>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:237)
>>         at
>> org.apache.catalina.core.ApplicationFilterChain.access$000(ApplicationFilterChain.java:55)
>>         at
>> org.apache.catalina.core.ApplicationFilterChain$1.run(ApplicationFilterChain.java:191)
>>         at
>> org.apache.catalina.core.ApplicationFilterChain$1.run(ApplicationFilterChain.java:187)
>>         at java.security.AccessController.doPrivileged(Native Method)
>>         at
>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:186)
>>         at
>> org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:218)
>>         at
>> org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:110)
>>         at
>> org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:498)
>>         at
>> org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:169)
>>         at
>> org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:103)
>>         at
>> org.apache.catalina.valves.AccessLogValve.invoke(AccessLogValve.java:962)
>>         at
>> org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:116)
>>         at
>> org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:445)
>>         at
>> org.apache.coyote.ajp.AjpProcessor.process(AjpProcessor.java:190)
>>         at
>> org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:637)
>>         at org.apache.tomcat.util.net
>> .JIoEndpoint$SocketProcessor.run(JIoEndpoint.java:316)
>>         at
>> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
>>         at
>> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
>>         at
>> org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
>>         at java.lang.Thread.run(Thread.java:750)
>> ```
>>
>> This is what we see when we run `getcert list` and `ipa-getcert list`
>> respectively:
>>
>> ```
>> Number of certificates and requests being tracked: 9.
>> Request ID '20190920201259':
>>         status: CA_UNREACHABLE
>>         ca-error: Server at https://<HOSTNAME>/ipa/xml failed request,
>> will retry: 4035 (RPC failed at server.  Request failed with status 500:
>> Non-2xx response from CA REST API: 500. String index out of range: -1).
>>         stuck: no
>>         key pair storage:
>> type=FILE,location='/var/kerberos/krb5kdc/kdc.key'
>>         certificate: type=FILE,location='/var/kerberos/krb5kdc/kdc.crt'
>>         CA: IPA
>>         issuer: CN=Certificate Authority,O=<OU>
>>         subject: CN=<HOSTNAME>,O=<OU>
>>         expires: 2023-08-25 18:05:07 UTC
>>         principal name: krbtgt/<OU>@<OU>
>>         key usage:
>> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>>         eku: id-kp-serverAuth,id-pkinit-KPKdc
>>         pre-save command:
>>         post-save command: /usr/libexec/ipa/certmonger/renew_kdc_cert
>>         track: yes
>>         auto-renew: yes
>> Request ID '20210908000050':
>>         status: MONITORING
>>         stuck: no
>>         key pair storage:
>> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert
>> cert-pki-ca',token='NSS FIPS 140-2 Certificate DB',pin set
>>         certificate:
>> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert
>> cert-pki-ca',token='NSS FIPS 140-2 Certificate DB'
>>         CA: dogtag-ipa-ca-renew-agent
>>         issuer: CN=Certificate Authority,O=<OU>
>>         subject: CN=CA Audit,O=<OU>
>>         expires: 2025-07-21 02:36:57 UTC
>>         key usage: digitalSignature,keyEncipherment,dataEncipherment
>>         eku: id-kp-serverAuth,id-kp-clientAuth
>>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
>> "auditSigningCert cert-pki-ca"
>>         track: yes
>>         auto-renew: yes
>> Request ID '20210908000051':
>>         status: MONITORING
>>         stuck: no
>>         key pair storage:
>> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='ocspSigningCert
>> cert-pki-ca',token='NSS FIPS 140-2 Certificate DB',pin set
>>         certificate:
>> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='ocspSigningCert
>> cert-pki-ca',token='NSS FIPS 140-2 Certificate DB'
>>         CA: dogtag-ipa-ca-renew-agent
>>         issuer: CN=Certificate Authority,O=<OU>
>>         subject: CN=OCSP Subsystem,O=<OU>
>>         expires: 2025-07-21 02:36:17 UTC
>>         key usage: digitalSignature,keyEncipherment,dataEncipherment
>>         eku: id-kp-serverAuth,id-kp-clientAuth
>>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
>> "ocspSigningCert cert-pki-ca"
>>         track: yes
>>         auto-renew: yes
>> Request ID '20210908000052':
>>         status: MONITORING
>>         stuck: no
>>         key pair storage:
>> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='subsystemCert
>> cert-pki-ca',token='NSS FIPS 140-2 Certificate DB',pin set
>>         certificate:
>> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='subsystemCert
>> cert-pki-ca',token='NSS FIPS 140-2 Certificate DB'
>>         CA: dogtag-ipa-ca-renew-agent
>>         issuer: CN=Certificate Authority,O=<OU>
>>         subject: CN=CA Subsystem,O=<OU>
>>         expires: 2025-07-21 02:37:17 UTC
>>         key usage: digitalSignature,keyEncipherment,dataEncipherment
>>         eku: id-kp-serverAuth,id-kp-clientAuth
>>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
>> "subsystemCert cert-pki-ca"
>>         track: yes
>>         auto-renew: yes
>> Request ID '20210908000053':
>>         status: MONITORING
>>         stuck: no
>>         key pair storage:
>> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='caSigningCert
>> cert-pki-ca',token='NSS FIPS 140-2 Certificate DB',pin set
>>         certificate:
>> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='caSigningCert
>> cert-pki-ca',token='NSS FIPS 140-2 Certificate DB'
>>         CA: dogtag-ipa-ca-renew-agent
>>         issuer: CN=Certificate Authority,O=<OU>
>>         subject: CN=Certificate Authority,O=<OU>
>>         expires: 2039-09-20 20:11:25 UTC
>>         key usage: digitalSignature,nonRepudiation,keyCertSign,cRLSign
>>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
>> "caSigningCert cert-pki-ca"
>>         track: yes
>>         auto-renew: yes
>> Request ID '20210908000054':
>>         status: MONITORING
>>         stuck: no
>>         key pair storage: type=FILE,location='/var/lib/ipa/ra-agent.key'
>>         certificate: type=FILE,location='/var/lib/ipa/ra-agent.pem'
>>         CA: dogtag-ipa-ca-renew-agent
>>         issuer: CN=Certificate Authority,O=<OU>
>>         subject: CN=IPA RA,O=<OU>
>>         expires: 2025-06-26 02:36:15 UTC
>>         key usage: digitalSignature,keyEncipherment,dataEncipherment
>>         eku: id-kp-serverAuth,id-kp-clientAuth
>>         pre-save command: /usr/libexec/ipa/certmonger/renew_ra_cert_pre
>>         post-save command: /usr/libexec/ipa/certmonger/renew_ra_cert
>>         track: yes
>>         auto-renew: yes
>> Request ID '20210908000055':
>>         status: MONITORING
>>         stuck: no
>>         key pair storage:
>> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='Server-Cert
>> cert-pki-ca',token='NSS FIPS 140-2 Certificate DB',pin set
>>         certificate:
>> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='Server-Cert
>> cert-pki-ca',token='NSS FIPS 140-2 Certificate DB'
>>         CA: dogtag-ipa-ca-renew-agent
>>         issuer: CN=Certificate Authority,O=<OU>
>>         subject: CN=<HOSTNAME>,O=<OU>
>>         expires: 2025-07-21 02:36:37 UTC
>>         dns: <HOSTNAME>
>>         key usage: digitalSignature,keyEncipherment,dataEncipherment
>>         eku: id-kp-serverAuth,id-kp-clientAuth
>>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
>> "Server-Cert cert-pki-ca"
>>         track: yes
>>         auto-renew: yes
>> Request ID '20210908000056':
>>         status: CA_UNREACHABLE
>>         ca-error: Server at https://<HOSTNAME>/ipa/xml failed request,
>> will retry: 4035 (RPC failed at server.  Request failed with status 500:
>> Non-2xx response from CA REST API: 500. String index out of range: -1).
>>         stuck: no
>>         key pair storage:
>> type=NSSDB,location='/etc/dirsrv/slapd-<OU>',nickname='CN=<HOSTNAME>,O=<OU>',token='NSS
>> FIPS 140-2 Certificate DB',pinfile='/etc/dirsrv/slapd-<OU>/pwdfile.txt'
>>         certificate:
>> type=NSSDB,location='/etc/dirsrv/slapd-<OU>',nickname='CN=<HOSTNAME>,O=<OU>',token='NSS
>> FIPS 140-2 Certificate DB'
>>         CA: IPA
>>         issuer: CN=Certificate Authority,O=<OU>
>>         subject: CN=<HOSTNAME>,O=<OU>
>>         expires: 2023-09-03 18:30:48 UTC
>>         dns: <HOSTNAME>
>>         key usage:
>> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>>         eku: id-kp-serverAuth,id-kp-clientAuth
>>         pre-save command:
>>         post-save command: /usr/libexec/ipa/certmonger/restart_dirsrv <OU>
>>         track: yes
>>         auto-renew: yes
>> Request ID '20210908000057':
>>         status: CA_UNREACHABLE
>>         ca-error: Server at https://<HOSTNAME>/ipa/xml failed request,
>> will retry: 4035 (RPC failed at server.  Request failed with status 500:
>> Non-2xx response from CA REST API: 500. String index out of range: -1).
>>         stuck: no
>>         key pair storage:
>> type=NSSDB,location='/etc/httpd/alias',nickname='CN=<HOSTNAME>,O=<OU>',token='NSS
>> FIPS 140-2 Certificate DB',pinfile='/etc/httpd/alias/pwdfile.txt'
>>         certificate:
>> type=NSSDB,location='/etc/httpd/alias',nickname='CN=<HOSTNAME>,O=<OU>',token='NSS
>> FIPS 140-2 Certificate DB'
>>         CA: IPA
>>         issuer: CN=Certificate Authority,O=<OU>
>>         subject: CN=<HOSTNAME>,O=<OU>
>>         expires: 2023-09-03 18:30:48 UTC
>>         dns: <HOSTNAME>
>>         key usage:
>> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>>         eku: id-kp-serverAuth,id-kp-clientAuth
>>         pre-save command:
>>         post-save command: /usr/libexec/ipa/certmonger/restart_httpd
>>         track: yes
>>         auto-renew: yes
>> ```
>>
>> ```
>> Number of certificates and requests being tracked: 9.
>> Request ID '20190920201259':
>>         status: CA_UNREACHABLE
>>         ca-error: Server at https://<HOSTNAME>/ipa/xml failed request,
>> will retry: 4035 (RPC failed at server.  Request failed with status 500:
>> Non-2xx response from CA REST API: 500. String index out of range: -1).
>>         stuck: no
>>         key pair storage:
>> type=FILE,location='/var/kerberos/krb5kdc/kdc.key'
>>         certificate: type=FILE,location='/var/kerberos/krb5kdc/kdc.crt'
>>         CA: IPA
>>         issuer: CN=Certificate Authority,O=<OU>
>>         subject: CN=<HOSTNAME>,O=<OU>
>>         expires: 2023-08-25 18:05:07 UTC
>>         principal name: krbtgt/<OU>@<OU>
>>         key usage:
>> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>>         eku: id-kp-serverAuth,id-pkinit-KPKdc
>>         pre-save command:
>>         post-save command: /usr/libexec/ipa/certmonger/renew_kdc_cert
>>         track: yes
>>         auto-renew: yes
>> Request ID '20210908000056':
>>         status: CA_UNREACHABLE
>>         ca-error: Server at https://<HOSTNAME>/ipa/xml failed request,
>> will retry: 4035 (RPC failed at server.  Request failed with status 500:
>> Non-2xx response from CA REST API: 500. String index out of range: -1).
>>         stuck: no
>>         key pair storage:
>> type=NSSDB,location='/etc/dirsrv/slapd-<OU>',nickname='CN=<HOSTNAME>,O=<OU>',token='NSS
>> FIPS 140-2 Certificate DB',pinfile='/etc/dirsrv/slapd-<OU>/pwdfile.txt'
>>         certificate:
>> type=NSSDB,location='/etc/dirsrv/slapd-<OU>',nickname='CN=<HOSTNAME>,O=<OU>',token='NSS
>> FIPS 140-2 Certificate DB'
>>         CA: IPA
>>         issuer: CN=Certificate Authority,O=<OU>
>>         subject: CN=<HOSTNAME>,O=<OU>
>>         expires: 2023-09-03 18:30:48 UTC
>>         dns: <HOSTNAME>
>>         key usage:
>> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>>         eku: id-kp-serverAuth,id-kp-clientAuth
>>         pre-save command:
>>         post-save command: /usr/libexec/ipa/certmonger/restart_dirsrv <OU>
>>         track: yes
>>         auto-renew: yes
>> Request ID '20210908000057':
>>         status: CA_UNREACHABLE
>>         ca-error: Server at https://<HOSTNAME>/ipa/xml failed request,
>> will retry: 4035 (RPC failed at server.  Request failed with status 500:
>> Non-2xx response from CA REST API: 500. String index out of range: -1).
>>         stuck: no
>>         key pair storage:
>> type=NSSDB,location='/etc/httpd/alias',nickname='CN=<HOSTNAME>,O=<OU>',token='NSS
>> FIPS 140-2 Certificate DB',pinfile='/etc/httpd/alias/pwdfile.txt'
>>         certificate:
>> type=NSSDB,location='/etc/httpd/alias',nickname='CN=<HOSTNAME>,O=<OU>',token='NSS
>> FIPS 140-2 Certificate DB'
>>         CA: IPA
>>         issuer: CN=Certificate Authority,O=<OU>
>>         subject: CN=<HOSTNAME>,O=<OU>
>>         expires: 2023-09-03 18:30:48 UTC
>>         dns: <HOSTNAME>
>>         key usage:
>> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>>         eku: id-kp-serverAuth,id-kp-clientAuth
>>         pre-save command:
>>         post-save command: /usr/libexec/ipa/certmonger/restart_httpd
>>         track: yes
>>         auto-renew: yes
>> ```
>> _______________________________________________
>> FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
>> To unsubscribe send an email to
>> freeipa-users-le...@lists.fedorahosted.org
>> Fedora Code of Conduct:
>> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
>> List Archives:
>> https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
>> Do not reply to spam, report it:
>> https://pagure.io/fedora-infrastructure/new_issue
>>
>
_______________________________________________
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to