the password provided for the uid caadmin may have been "incorrect"
Thanks,
M.
On 08/19/2016 10:45 AM, Leonardo Bacha Abrantes wrote:
 Hi, bellow my debug log
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 SessionContextInterceptor: SecurityDomainResource.getDomainInfo()
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 SessionContextInterceptor: Not authenticated.
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: AuthMethodInterceptor: 
 SecurityDomainResource.getDomainInfo()
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: AuthMethodInterceptor: 
 mapping: default
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: AuthMethodInterceptor: 
 required auth methods: [*]
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: AuthMethodInterceptor: 
 anonymous access allowed
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: ACLInterceptor: 
 SecurityDomainResource.getDomainInfo()
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: ACLInterceptor.filter: 
 no authorization required
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: ACLInterceptor: No ACL 
 mapping; authz not required.
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 SignedAuditEventFactory: create() 
message=[AuditEvent=AUTHZ_SUCCESS][SubjectID=$Unidentified$][Outcome=Success][aclResource=null][Op=null][Info=ACL
 mapping not found; OK:SecurityDomainResource.getDomainInfo] 
 authorization success
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 MessageFormatInterceptor: SecurityDomainResource.getDomainInfo()
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 MessageFormatInterceptor: content-type: null
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 MessageFormatInterceptor: accept: [application/json]
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 MessageFormatInterceptor: response format: application/json
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: according to ccMode, 
 authorization for servlet: securitydomain is LDAP based, not XML {1}, 
 use default authz mgr: {2}.
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: Creating 
 LdapBoundConnFactor(SecurityDomainProcessor)
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: LdapBoundConnFactory: init
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 LdapBoundConnFactory:doCloning true
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: LdapAuthInfo: init()
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: LdapAuthInfo: init begins
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: LdapAuthInfo: init: 
 prompt is internaldb
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: LdapAuthInfo: init: try 
 getting from memory cache
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: LdapAuthInfo: init: got 
 password from memory
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: LdapAuthInfo: init: 
 password found for prompt.
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: LdapAuthInfo: password 
 ok: store in memory cache
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: LdapAuthInfo: init ends
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: init: before 
 makeConnection errorIfDown is false
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: makeConnection: 
 errorIfDown false
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: Established LDAP 
 connection using basic authentication to host root-ca.xxxxx.xxx.xx 
 port 389 as cn=ldapadmin
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: initializing with 
 mininum 3 and maximum 15 connections to host root-ca.xxxxx.xxx.xx port 
 389, secure connection, false, authentication type 1
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: increasing minimum 
 connections by 3
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: new total available 
 connections 3
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: new number of connections 3
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: In 
 LdapBoundConnFactory::getConn()
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: masterConn is 
 connected: true
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: getConn: conn is 
 connected true
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: getConn: mNumConns now 2
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 SecurityDomainProcessor: name: xxxxx.xxx.xx Security Domain
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 SecurityDomainProcessor: subtype: CA
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 SecurityDomainProcessor:  - 
 cn=root-ca.xxxxx.xxx.xx:8443,cn=CAList,ou=Security Domain,o=pki-RootCA-CA
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 SecurityDomainProcessor:    - objectClass: top
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 SecurityDomainProcessor:    - host: root-ca.xxxxx.xxx.xx
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 SecurityDomainProcessor:    - SecurePort: 8443
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 SecurityDomainProcessor:    - SecureAgentPort: 8443
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 SecurityDomainProcessor:    - SecureAdminPort: 8443
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 SecurityDomainProcessor:    - SecureEEClientAuthPort: 8443
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 SecurityDomainProcessor:    - UnSecurePort: 8080
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 SecurityDomainProcessor:    - Clone: FALSE
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 SecurityDomainProcessor:    - SubsystemName: CA root-ca.xxxxx.xxx.xx 8443
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 SecurityDomainProcessor:    - cn: root-ca.xxxxx.xxx.xx:8443
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 SecurityDomainProcessor:    - DomainManager: TRUE
 [03/Aug/2016:11:39:14][http-bio-8443-exec-19]: 
 SecurityDomainProcessor: subtype: OCSP
 [03/Aug/2016:11:39:15][http-bio-8443-exec-19]: 
 SecurityDomainProcessor: subtype: KRA
 [03/Aug/2016:11:39:15][http-bio-8443-exec-19]: 
 SecurityDomainProcessor: subtype: RA
 [03/Aug/2016:11:39:15][http-bio-8443-exec-19]: 
 SecurityDomainProcessor: subtype: TKS
 [03/Aug/2016:11:39:15][http-bio-8443-exec-19]: 
 SecurityDomainProcessor: subtype: TPS
 [03/Aug/2016:11:39:15][http-bio-8443-exec-19]: Releasing ldap connection
 [03/Aug/2016:11:39:15][http-bio-8443-exec-19]: returnConn: mNumConns now 3
 [03/Aug/2016:11:39:15][http-bio-8443-exec-19]: PKIRealm: 
 Authenticating user caadmin with password.
 [03/Aug/2016:11:39:15][http-bio-8443-exec-19]: 
 PasswdUserDBAuthentication: UID: caadmin
 [03/Aug/2016:11:39:15][http-bio-8443-exec-19]: In 
 LdapBoundConnFactory::getConn()
 [03/Aug/2016:11:39:15][http-bio-8443-exec-19]: masterConn is 
 connected: true
 [03/Aug/2016:11:39:15][http-bio-8443-exec-19]: getConn: conn is 
 connected true
 [03/Aug/2016:11:39:15][http-bio-8443-exec-19]: getConn: mNumConns now 2
 [03/Aug/2016:11:39:15][http-bio-8443-exec-19]: returnConn: mNumConns now 3
 [03/Aug/2016:11:39:15][http-bio-8443-exec-19]: 
 PasswdUserDBAuthentication: DN: uid=caadmin,ou=people,o=pki-RootCA-CA
 [03/Aug/2016:11:39:15][http-bio-8443-exec-19]: 
 LdapAnonConnFactory::getConn
 [03/Aug/2016:11:39:15][http-bio-8443-exec-19]: 
 LdapAnonConnFactory.getConn(): num avail conns now 2
 [03/Aug/2016:11:39:15][http-bio-8443-exec-19]: returnConn: mNumConns now 2
 [03/Aug/2016:11:39:15][http-bio-8443-exec-19]: 
 SignedAuditEventFactory: create() 
message=[AuditEvent=AUTH_FAIL][SubjectID=$Unidentified$][Outcome=Failure][AuthMgr=passwdUserDBAuthMgr][AttemptedCred=caadmin]
 authentication failure
 any help will be very much appreciated !
 On Fri, Aug 19, 2016 at 7:28 AM, Leonardo Bacha Abrantes 
 <leonardo(a)lbasolutions.com <mailto:leonardo@lbasolutions.com>> wrote:
     Hi guys,
     I'm trying to configure a subordinate CA, but am receiving the
     message "ERROR:  Unable to access security domain: 401 Client
     Error: Unauthorized".
     I follow these steps:
     ===>> On Server01 (root-ca):
     setup-ds.pl <
http://setup-ds.pl> --silent
     General.FullMachineName=root-ca.xxx.xxx.xx \
     General.SuiteSpotUserID=nobody General.SuiteSpotGroup=nobody \
     slapd.ServerPort=389 slapd.ServerIdentifier=pki-RootCA \
     slapd.Suffix=dc=EXAMPLE,dc=xxx,dc=xx \
     slapd.RootDN="cn=ldapadmin" slapd.RootDNPwd=PASSWORD
     > myconfig.txt
     [DEFAULT]
     pki_admin_password=Root-CA_pwd
     pki_client_database_password=Root-CA_pwd
     pki_client_pkcs12_password=Root-CA_pwd
     pki_ds_password=Root-CA_pwd
     pki_security_domain_password=Root-CA_pwd
     pki_admin_password=Root-CA_pwd
     pki_client_database_password=Root-CA_pwd
     pki_client_pkcs12_password=Root-CA_pwd
     pki_ds_bind_dn=cn=ldapadmin
     pki_ds_password=Root-CA_pwd
     pki_security_domain_password=Root-CA_pwd
     pki_instance_name=pki-RootCA
     [CA]
     pki_ca_signing_subject_dn=cn=EXAMLE Root Certification
     Authority,o=XXXXXXXXXXX,c=BR
     pki_admin_nickname=PKI Administrator for EXAMPLE
     pki_admin_subject_dn=cn=PKI Administrator Root
     CA,e=admin(a)XXXXX.XXX.xx,o=XXXXXXXXXX,c=BR
     pki_admin_email=admin(a)XXXXXX.xxx.xx
     ===>> On Server02 (Sub-ca):
     setup-ds.pl <
http://setup-ds.pl> --silent
     General.FullMachineName=sub-ca.xxx.xxx.xx \
     General.SuiteSpotUserID=nobody General.SuiteSpotGroup=nobody \
     slapd.ServerPort=389 slapd.ServerIdentifier=pki-SubCA \
     slapd.Suffix=dc=EXAMPLE,dc=xxx,dc=xx \
     slapd.RootDN="cn=ldapadmin" slapd.RootDNPwd=OTHER_PASSWORD
     > myconfig.txt
     [DEFAULT]
     pki_admin_password=SUB-CA_Passord
     pki_client_database_password=SUB-CA_Passord
     pki_client_pkcs12_password=SUB-CA_Passord
     pki_ds_password=SUB-CA_Passord
     pki_security_domain_password=SUB-CA_Passord
     pki_admin_password=SUB-CA_Passord
     pki_client_database_password=SUB-CA_Passord
     pki_client_pkcs12_password=SUB-CA_Passord
     pki_ds_bind_dn=cn=ldapadmin
     pki_ds_password=SUB-CA_Passord
     pki_security_domain_password=SUB-CA_Passord
     pki_instance_name=pki-SubCA
     pki_security_domain_hostname=root-ca.xxxx.xxx.xx
     pki_security_domain_https_port=8443
     pki_security_domain_user=caadmin
     [CA]
     pki_subordinate=True
     pki_issuing_ca=https://root-ca.xxxx.xxxv.xx:8443
     <
https://root-ca.xxxx.xxxv.xx:8443>
     pki_ca_signing_subject_dn=cn=EXAMPLE Certification Authority
     L2,o=XXXXXXXXXXX,c=BR
     pki_subordinate_create_new_security_domain=True
     pki_subordinate_security_domain_name=EXAMPLE Certification
     Authority L2
     pki_admin_nickname=PKI Administrator for Example Sub-CA L2
     pki_admin_subject_dn=cn=PKI Administrator CA
     L2,e=admin(a)xxxxx.xxx.xx,o=XXXXXXXXXXX,c=BR
     pki_admin_email=admin(a)xxxx.xxx.xx
     when I run pkispawn -v -s CA -f myconfig.txt on Server02:
     ERROR:  Unable to access security domain: 401 Client Error:
     Unauthorized
     ===
     I tried to use the same passwords on myconfig.txt in both servers
     just to test, but I receive the same message.
     Can you help me please ?
     many thanks!
 _______________________________________________
 Pki-users mailing list
 Pki-users(a)redhat.com
 
https://www.redhat.com/mailman/listinfo/pki-users