Hi, your values for crlDistPointsIssuerType_0 and
crlDistPointsIssueName_0 need to be switched. Let me know if this helps.
Christina
Chris Cayetano wrote:
Additional Info:
Some entries from the debug log:
[12/Apr/2008:23:54:42][http-9443-Processor20]:
CRLDistribtionPointsExtDefault: createExtension Invalid Property
http://pkica.company.com <
http://pkica.company.com/>
[12/Apr/2008:23:54:42][http-9443-Processor20]:
CRLDistribtionPointsExtDefault: createExtension Invalid Property
http://pkica.company.com <
http://pkica.company.com/>
From the Red Hat documentation, when using the IssuerName_0=URIName,
the IssuerType_n= should be:
/ For URIName, the value must be a non-relative URI following the URL
syntax and encoding rules. The name must include both a scheme, such
as http, and a fully qualified domain name or IP address of the host.
For example,
http://testCA.example.com./
So based on the Red Hat documentation, not sure what the value to be.
Thanks,
Chris Cayetano
On 4/11/08, *Chris* <crc408(a)gmail.com <mailto:crc408@gmail.com>> wrote:
Unable to get the CDP in the issuing certificates. Taking the
caUserCert profile, it looks like CDP isn't in the profiles by
default, which appears to be the default for all certificates.
Using the PKI Console, I added the CRL Distribution Points
Extension Default with No Constraints
* The information below was entered based on examples in the Red
Hat documentation (
http://www.redhat.com/docs/manuals/cert-system/7.3/html/Administration_Gu...
).
[Default] tab
crlDistPointsCritical = false
crlDistPointsPointType_0 = URIName
crlDistPointsPointName_0 =
http://crl.company.com:80
<
http://crl.company.com/>
crlDistPointsReasons_0 = unused,superseded
crlDistPointsIssuerType_0 =
http://pkica.corp.company.com
<
http://pkica.corp.company.com/>
crlDistPointsIssueName_0 = URIName
crlDistPointsEnable_0 = true
When generating the certificate the CDP field is still not
visible.I've attached a summary of the profile below with the new
CDP field added.
Any ideas?
Thanks.
Chris
--
------------------------------------
*Certificate Profile Information:*
Certificate Profile Id: caUserCert
Certificate Profile Name: Manual User Dual-Use Certificate
Enrollment <
http://profileselect/?profileId=caUserCert>
Description: This certificate profile is for enrolling user
certificates.
Approved: false
Approved By:
*Policy Information:*
Policy Set: userCertSet
*#* *Extensions / Fields* *Constraints*
1 This default populates a User-Supplied Certificate Subject Name
to the request.
This constraint accepts the subject name that matches CN=.*
2 This default populates a Certificate Validity to the request.
The default values are Range=180 in days
This constraint rejects the validity that is not between 365 days
3 This default populates a User-Supplied Certificate Key to the
request.
This constraint accepts the key only if Key Type=-, Key Min
Length=256, Key Max Length=4096
4 This default populates an Authority Key Identifier Extension
(2.5.29.35 <
http://2.5.29.35/>) to the request.
No Constraint
5 This default populates a Authority Info Access Extension
(1.3.6.1.5.5.7.1.1) to the request. The default values are
Criticality=false, Record #0{Method:1.3.6.1.5.5.7.48.1,Location
Type:URIName,Location:,Enable:true}
No Constraint
6 This default populates a Key Usage Extension (2.5.29.15
<
http://2.5.29.15/>) to the request. The default values are
Criticality=true, Digital Signature=true, Non-Repudiation=true,
Key Encipherment=true, Data Encipherment=false, Key
Agreement=false, Key Certificate Sign=false, Key CRL Sign=false,
Encipher Only=false, Decipher Only=false
This constraint accepts the Key Usage extension, if present, only
when Criticality=true, Digital Signature=true,
Non-Repudiation=true, Key Encipherment=true, Data
Encipherment=false, Key Agreement=false, Key Certificate
Sign=false, Key CRL Sign=false, Encipher Only=false, Decipher
Only=false
7 This default populates an Extended Key Usage Extension () to
the request. The default values are Criticality=false,
OIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4
No Constraint
9 This default populates the Certificate Signing Algorithm. The
default values are Algorithm=SHA1withRSA
This constraint accepts only the Signing Algorithms of
SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withEC
12 This default populates a CRL Distribution Points Extension
(2.5.29.31 <
http://2.5.29.31/>) to the request. The default values
are Criticality=false, Record #0{Point
Type:http://crl.company.com:80 <
http://crl.company.com/>,Point
Name:URIName,Reasons:unused,superseded,Issuer
Type:http://pkica.company.com <
http://pkica.company.com/>,Issuer
Name:URIName,Enable:true}Record #1{Point Type:,Point
Name:,Reasons:,Issuer Type:,Issuer Name:,Enable:false}Record
#2{Point Type:,Point Name:,Reasons:,Issuer Type:,Issuer
Name:,Enable:false}Record #3{Point Type:,Point
Name:,Reasons:,Issuer Type:,Issuer Name:,Enable:false}Record
#4{Point Type:,Point Name:,Reasons:,Issuer Type:,Issuer
Name:,Enable:false}
No Constraint
------------------------------------------------------------------------
_______________________________________________
Pki-users mailing list
Pki-users(a)redhat.com
https://www.redhat.com/mailman/listinfo/pki-users