Hello,

I have the following certificates structure:

caroot (self-signed cert)
   |-----------------> ca1 -------------> user1
   |-----------------> ca2 -------------> user2
   |-----------------> ca3 -------------> server
   \-----------------> user3

user4 (self-signed cert)

I want to give access to users with a valid certificate, and deny access to
others. In this situation, a valid certificate is a certificate issued by ca1.
Then, only user1 is authorized to access pages from Apache; user2 and user3
must be refused. From what I've understood, there is no way to deny access to
user4, as it has a self-signed certificate.

In short, here is my config:

SSLCertificateFile server.pem
SSLCertificateKeyFile server.key
SSLCertificateChainFile caroot-ca3.pem

SSLCACertificateFile ca1.pem
SSLVerifyClient require
SSLVerifyDepth 1

When I try to access a protected resource with Firefox, where the certificate
from user1 has been imported, I get the following:

[error] Certificate Verification: Error (20): unable to get local issuer
certificate
[info] SSL library error 1 in handshake
[info] SSL Library Error: 336105650 error:140890B2:SSL
routines:SSL3_GET_CLIENT_CERTIFICATE:no certificate returned

Can anyone highlight my mistakes please? I really need to get it working.
Thanks!
-- 
Julien ALLANOS

---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: [EMAIL PROTECTED]
   "   from the digest: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to