Hi,
It worked !!
Only the Subordinate CA has a certificate valid only for 2 years. Now I'm
looking for how to increase it.
Many thanks!
On Mon, Aug 22, 2016 at 11:03 AM, Ade Lee <alee(a)redhat.com> wrote:
See inline below --
On Fri, 2016-08-19 at 07:28 -0300, Leonardo Bacha Abrantes wrote:
Hi guys,
I'm trying to configure a subordinate CA, but am receiving the message
"ERROR: Unable to access security domain: 401 Client Error: Unauthorized".
I follow these steps:
===>> On Server01 (root-ca):
setup-ds.pl --silent General.FullMachineName=root-ca.xxx.xxx.xx \
General.SuiteSpotUserID=nobody General.SuiteSpotGroup=nobody \
slapd.ServerPort=389 slapd.ServerIdentifier=pki-RootCA \
slapd.Suffix=dc=EXAMPLE,dc=xxx,dc=xx \
slapd.RootDN="cn=ldapadmin" slapd.RootDNPwd=PASSWORD
> myconfig.txt
[DEFAULT]
pki_admin_password=Root-CA_pwd
pki_client_database_password=Root-CA_pwd
pki_client_pkcs12_password=Root-CA_pwd
pki_ds_password=Root-CA_pwd
pki_security_domain_password=Root-CA_pwd
pki_admin_password=Root-CA_pwd
pki_client_database_password=Root-CA_pwd
pki_client_pkcs12_password=Root-CA_pwd
pki_ds_bind_dn=cn=ldapadmin
pki_ds_password=Root-CA_pwd
pki_security_domain_password=Root-CA_pwd
pki_instance_name=pki-RootCA
[CA]
pki_ca_signing_subject_dn=cn=EXAMLE Root Certification
Authority,o=XXXXXXXXXXX,c=BR
pki_admin_nickname=PKI Administrator for EXAMPLE
pki_admin_subject_dn=cn=PKI Administrator Root CA,e=admin(a)XXXXX.XXX.xx,o=
XXXXXXXXXX,c=BR
pki_admin_email=admin(a)XXXXXX.xxx.xx
===>> On Server02 (Sub-ca):
setup-ds.pl --silent General.FullMachineName=sub-ca.xxx.xxx.xx \
General.SuiteSpotUserID=nobody General.SuiteSpotGroup=nobody \
slapd.ServerPort=389 slapd.ServerIdentifier=pki-SubCA \
slapd.Suffix=dc=EXAMPLE,dc=xxx,dc=xx \
slapd.RootDN="cn=ldapadmin" slapd.RootDNPwd=OTHER_PASSWORD
> myconfig.txt
[DEFAULT]
pki_admin_password=SUB-CA_Passord
pki_client_database_password=SUB-CA_Passord
pki_client_pkcs12_password=SUB-CA_Passord
pki_ds_password=SUB-CA_Passord
pki_security_domain_password=SUB-CA_Passord
pki_admin_password=SUB-CA_Passord
pki_client_database_password=SUB-CA_Passord
pki_client_pkcs12_password=SUB-CA_Passord
pki_ds_bind_dn=cn=ldapadmin
pki_ds_password=SUB-CA_Passord
pki_security_domain_password=SUB-CA_Passord
This is incorrect. The security domain password -- which for some reason
you have listed twice
in this section -- should be the password for the admin user in the root
CA.
The subCA is contacting the rootCA - which hosts the secruity domain to
register the new subsystem
with the domain.
pki_instance_name=pki-SubCA
pki_security_domain_hostname=root-ca.xxxx.xxx.xx
pki_security_domain_https_port=8443
pki_security_domain_user=caadmin
[CA]
pki_subordinate=True
pki_issuing_ca=https://root-ca.xxxx.xxxv.xx:8443
pki_ca_signing_subject_dn=cn=EXAMPLE Certification Authority
L2,o=XXXXXXXXXXX,c=BR
pki_subordinate_create_new_security_domain=True
pki_subordinate_security_domain_name=EXAMPLE Certification Authority L2
pki_admin_nickname=PKI Administrator for Example Sub-CA L2
pki_admin_subject_dn=cn=PKI Administrator CA L2,e=admin(a)xxxxx.xxx.xx,o=
XXXXXXXXXXX,c=BR
pki_admin_email=admin(a)xxxx.xxx.xx
when I run pkispawn -v -s CA -f myconfig.txt on Server02:
ERROR: Unable to access security domain: 401 Client Error: Unauthorized
===
I tried to use the same passwords on myconfig.txt in both servers just to
test, but I receive the same message.
Can you help me please ?
many thanks!
_______________________________________________
Pki-users mailing
listPki-users@redhat.comhttps://www.redhat.com/mailman/listinfo/pki-users