Hi,
currently I'm stuck with validity of a certificate requested via RPC.
In /etc/openxpki I have:

rpc/myclient.conf (copy of enroll.conf):
[..]
realm = myca
[..]
[RequestCertificate]
workflow = certificate_enroll
param = pkcs10, profile, comment, signature
output = cert_identifier, certificate, chain, error_code, transaction_id
env = signer_cert, server
pickup = pkcs10, transaction_id
pickup_workflow = check_enrollment
---
config.d/realm/myca/rpc/myclient.yaml (copy of enroll.yaml):
[..]
profile:
  cert_profile: test_client
  cert_subject_style: enroll
---
config.d/realm/myca/profile/test_client.yaml (copy of tls_client.yaml):
[..]
validity:
    notafter: +24
[..]
    enroll:
        subject:
            dn: CN=[% CN.0 %],DC=testing,DC=example,DC=com

I can request a certificate via 
curl -X POST --form method="RequestCertificate" --form pkcs10="`cat my.csr`" 
http://localhost/rpc/myclient/RequestCertificate

But it always has a validity of 1 month (validity: notafter: +01) as tls_client 
has.
What's going wrong here ?


Thanks and best regards,

Stefan

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
OpenXPKI-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openxpki-users

Reply via email to