Re: [OpenXPKI-users] Auto Approve for Revocation RPC API

2022-11-15 Thread Mukilan P via OpenXPKI-users
Hi Oliver,  Thank you very much for your detailed response.  I am able to revoked certificate by setting preset_flag_auto_approval. One more query, I also modify the eligible section in enroll.yaml file based on one of the thread as below. eligible:    initial:       #value@: connector:rpc.enrol

[OpenXPKI-users] Disabling PKCS10 signature verification

2022-11-15 Thread Mukilan P via OpenXPKI-users
Hi Experts, Is there any way to disable pkcs10 signature verification as part of enroll/renewal in OpenXPKI? Thanks in advance. Regards,Mukilan___ OpenXPKI-users mailing list OpenXPKI-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listin

Re: [OpenXPKI-users] Disabling PKCS10 signature verification

2022-11-15 Thread Mukilan P via OpenXPKI-users
Hi Experts, This is further to the above query. I changed the value verify_signature to 0 in workflow/global/validator/pkcs10_valid.yaml like below, but getting 'PREPARED' status instead of SUCCESS  class: OpenXPKI::Server::Workflow::Validator::PKCS10param:    empty_subject: 1    verify_signatu

Re: [OpenXPKI-users] Disabling PKCS10 signature verification

2022-11-15 Thread Oliver Welter
Hi Mukilan, if you look at the workflow history you will very likely see the output of a crashed OpenSSL command. The OpenXPKI default backend uses the openssl binary to sign CSRs and this does not work if the PCKS10 container is not properly formated/signed. We had such a problem at a custo

Re: [OpenXPKI-users] Disabling PKCS10 signature verification

2022-11-15 Thread Mukilan P via OpenXPKI-users
Hi Oliver, Thanks for your fast response.  Does it mean that we can't ignore signatureverification for CSR? I will explain the use case. We would like to modify theSubjectDN/SAN as part of our own policy while internal clients (devices, computersand etc) are raising certificate requests. Th

Re: [OpenXPKI-users] Disabling PKCS10 signature verification

2022-11-15 Thread Martin Bartosch via OpenXPKI-users
Hi Mukilan, > Does it mean that we can't ignore signature verification for CSR? I will > explain the use case. We would like to modify the SubjectDN/SAN as part of > our own policy while internal clients (devices, computers and etc) are > raising certificate requests. The internal clients will