We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
This issue was migrated from Pagure Issue #595. Originally filed by edewata (@edewata) on 2013-04-26 19:41:05:
To uninstall KRA, pkidestroy needs to remove the connector from CA by calling:
pki --ignore-cert-status UNTRUSTED_ISSUER kraconnector-del
The UNTRUSTED_ISSUER must be ignored because otherwise the CLI will prompt the pkidestroy to trust the CA certificate, which will cause it to hang.
A possible solution is to import the CA certificate during KRA installation using this command:
pki client-import-cert --ca-server
Another possible solution is to prompt the user during pkidestroy whether to trust the CA certificate.
The text was updated successfully, but these errors were encountered:
Comment from edewata (@edewata) at 2013-04-27 22:05:54
pkidestroy also calls:
pki --ignore-cert-status UNTRUSTED_ISSUER securitydomain-get-install-token
Sorry, something went wrong.
Comment from vakwetu (@vakwetu) at 2013-04-30 15:44:49
This is no longer valid as the code has been changed.
Comment from edewata (@edewata) at 2017-02-27 14:04:56
Metadata Update from @edewata:
No branches or pull requests
This issue was migrated from Pagure Issue #595. Originally filed by edewata (@edewata) on 2013-04-26 19:41:05:
To uninstall KRA, pkidestroy needs to remove the connector from CA by calling:
The UNTRUSTED_ISSUER must be ignored because otherwise the CLI will prompt the pkidestroy to trust the CA certificate, which will cause it to hang.
A possible solution is to import the CA certificate during KRA installation using this command:
Another possible solution is to prompt the user during pkidestroy whether to trust the CA certificate.
The text was updated successfully, but these errors were encountered: