Hi, On Sat, Jul 1, 2023 at 3:48 AM alexey safonov <[email protected]> wrote:
> Got it. thanks. Would it be possible to use for KDS self-signed > certificate, while for dirsrv/http normal certificate signed by public > CA? > > It is possible to have different certificates for dirsrv/httpd/kdc, and even different cert chains. For instance ExternalCA1 > dirsrv, ExternalCA2 > http, External CA3 > KDC. Each one can be installed with ipa-cacert-manage install -t CT,C,C <external CA> followed by ipa-certupdate and ipa-server-certinstall (with either -d / -w /-k). If I recall correctly, a self-signed KDC certificate will allow IPA to function but won't enable PKINIT authentication (see https://freeipa.org/page/V4/Kerberos_PKINIT). You can generate a CA and have this CA generate your KDC cert by following instructions from https://web.mit.edu/kerberos/krb5-1.12/doc/admin/pkinit.html flo пн, 19 июн. 2023 г. в 14:46, Florence Blanc-Renaud <[email protected]>: > > > > Hi, > > > > > > On Sun, Jun 18, 2023 at 3:47 AM alexey safonov via FreeIPA-users < > [email protected]> wrote: > >> > >> I'm just surprised than, how other replicas has PKINIT? > > > > > > in your first email you mentioned that the topology used to have a CA. > If a replica was installed at that time then IPA CA issued a KDC > certificate for this replica, with the required extensions. But be aware > that when it reaches it expiration date, it won't be automatically renewed, > and you will have to get a new KDC cert outside of IPA, then install it > using ipa-server-certinstall with the --kdc option. > > > > flo > >> > >> > >> пт, 16 июн. 2023 г. в 23:07, Rob Crittenden <[email protected]>: > >> > > >> > alexey safonov via FreeIPA-users wrote: > >> > > Hi, I've a FreeIPA setup 4.10.1 (that's a long-living setup that was > >> > > upgraded many times). It is CA-less setup (Inititally we had CA, but > >> > > than it was removed). So now 4 of my servers are saying that PKINIT > >> > > is enabled and one server is saying "disabled". > >> > > > >> > > I tried to re-install replica, but it says CA-less mode can't issue > a > >> > > certificate, so I tried with kdc-cert-file, but than it says cert is > >> > > not valid (where it's definitly works for web and ldap). > >> > > > >> > > Anything I can do here and enable pkinit on that replica? > >> > > >> > A KDC cert has some extensions not typically found in a server > >> > certificate. This page outlines the requirements: > >> > https://web.mit.edu/kerberos/krb5-1.12/doc/admin/pkinit.html > >> > > >> > rob > >> > > >> _______________________________________________ > >> FreeIPA-users mailing list -- [email protected] > >> To unsubscribe send an email to > [email protected] > >> Fedora Code of Conduct: > https://docs.fedoraproject.org/en-US/project/code-of-conduct/ > >> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines > >> List Archives: > https://lists.fedorahosted.org/archives/list/[email protected] > >> Do not reply to spam, report it: > https://pagure.io/fedora-infrastructure/new_issue > >
_______________________________________________ FreeIPA-users mailing list -- [email protected] To unsubscribe send an email to [email protected] Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/[email protected] Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
