Hello,
i've checked it, the CA is trusted (Firefox Browser). I have also the problem that the
Logon with pkiconsole now crashed. The login-window came up after username/password the
pkiconsole exits. Tomorrow i will look for the debug-log what happens and also uses the IE
for testing.
regards Klaus Heyden
-----Ursprüngliche Nachricht-----
Von: "Marc Sauton" <msauton(a)redhat.com>
Gesendet: 29.10.08 20:38:09
An: Klaus (Allianz ASIC)" <KLAUS.HEYDEN(a)ALLIANZ.DE>
CC: pki-users(a)redhat.com
Betreff: Re: [Pki-users] failed Administrator logon
Heyden, Klaus (Allianz ASIC) wrote:
> Hello,
>
> i have the problem the the CA don't accept the Administrator login.
> Either on HTTPS-interface or via pkiconsole. It's a new installation
> and the Admin-Certificate exists in the Browser with secret key. The
> problem ist that the CA first dor thier job normal. When i now try to
> login i got a catalina error like this. i dont reconfigure the CA only
> restart. I also configured an HSM (Luna) but dont use key's inside the
> HSM.
You may want to collect the ca debug log when you try to do client auth
in your browser against the https agent pages.
Or review the debug log during the ca instance configuration, near the
key generation for the ca instance or when you selected either a
software token or hsm, for any errors.
I suppose the ca instance was restarted after the web based wizard
configuration was successfully completed.
It is always possible to use another client certificate for an agent or
admin user of the certificate system.
You may want to verify the browser has and trust the issuer of the agent
cert you try to use.
> -------------------catalina.out----------------------------------
> Oct 29, 2008 5:43:55 PM org.apache.catalina.core.ApplicationContext log"
> INFO: caListRequests: You did not provide a valid certificate for this
> operation
> ----------------------------------------------------------------------
>
> the debug-file shows:
> ---------------------debug----------------------------------------
> [29/Oct/2008:18:15:07][http-9443-Processor21]: CMSServlet:service()
> uri = /ca/agent/header
> [29/Oct/2008:18:15:07][http-9443-Processor21]: CMSServlet::service()
> param name='selected' value='ca'
> [29/Oct/2008:18:15:07][http-9443-Processor21]: CMSServlet: caheader
> start to service.
> [29/Oct/2008:18:15:07][http-9443-Processor21]: CMSServlet.java:
> renderTemplate
> [29/Oct/2008:18:15:07][http-9443-Processor21]: CMSServlet: curDate=Wed
> Oct 29 18:15:07 CET 2008 id=caheader time=0
> [29/Oct/2008:18:15:07][http-9443-Processor21]: CMSServlet:service()
> uri = /ca/agent/ca/listRequests.html
> [29/Oct/2008:18:15:07][http-9443-Processor21]: CMSServlet:
> caListRequests start to service.
> [29/Oct/2008:18:15:07][http-9443-Processor21]: DisplayHtmlServlet
> about to service
> [29/Oct/2008:18:15:07][http-9443-Processor21]: IP: 10.94.112.222
> [29/Oct/2008:18:15:07][http-9443-Processor21]: AuthMgrName:
> certUserDBAuthMgr
> [29/Oct/2008:18:15:07][http-9443-Processor21]: CMSServlet: retrieving
> SSL certificate
> [29/Oct/2008:18:15:07][http-9443-Processor21]:
> SignedAuditEventFactory: create()
>
message=[AuditEvent=AUTH_FAIL][SubjectID=$Unidentified$][Outcome=Failure][AuthMgr=$Unidentified$][AttemptedCred=$Unidentified$]
> authentication failure
> [29/Oct/2008:18:15:08][CRLIssuingPoint-MasterCRL]: getConn: mNumConns
> now 2
> [29/Oct/2008:18:15:08][CRLIssuingPoint-MasterCRL]:
> ObjectStreamMapper:mapObjectToLDAPAttributeSet revokedCerts size=84
> [29/Oct/2008:18:15:08][CRLIssuingPoint-MasterCRL]:
> ObjectStreamMapper:mapObjectToLDAPAttributeSet unrevokedCerts size=84
> [29/Oct/2008:18:15:08][CRLIssuingPoint-MasterCRL]:
> ObjectStreamMapper:mapObjectToLDAPAttributeSet expiredCerts size=84
> [29/Oct/2008:18:15:08][CRLIssuingPoint-MasterCRL]: returnConn:
> mNumConns now 3
> ----------------------------------------------------------------------
>
> certutil -L -d . shows me:
> ----------------------------------------------------------------------
> Certificate Nickname Trust
> Attributes
>
> SSL,S/MIME,JAR/XPI
> ocspSigningCert cert-ca4-1 u,u,u
> subsystemCert cert-ca4-1 u,u,u
> caSigningCert cert-ca4-1 CTu,Cu,Cu
> Server-Cert cert-ca4-1 u,u,u
> Allianz Group Root CA II - Allianz Group CT,C,C
> ----------------------------------------------------------------------
>
>
> reagards
> Klaus Heyden
>
>
> ------------------------------------------------------------------------
>
> _______________________________________________
> Pki-users mailing list
> Pki-users(a)redhat.com
>
https://www.redhat.com/mailman/listinfo/pki-users
>
_______________________________________________
Pki-users mailing list
Pki-users(a)redhat.com
https://www.redhat.com/mailman/listinfo/pki-users
_________________________________________________________________________
In 5 Schritten zur eigenen Homepage. Jetzt Domain sichern und gestalten!
Nur 3,99 EUR/Monat!
http://www.maildomain.web.de/?mc=021114