-
Notifications
You must be signed in to change notification settings - Fork 138
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
setting different pki_security_domain_password and pki_admin_password should be allowed #1991
Comments
Comment from mharmsen (@mharmsen) at 2015-06-22 22:16:54 Per CS/DS Meeting of 06/22/2015: 10.3 |
Comment from mharmsen (@mharmsen) at 2015-07-06 20:46:20 Per discussions, moving this ticket back to 10.2.6 Milestone. |
Comment from vakwetu (@vakwetu) at 2015-07-07 18:39:47 There seems to be some confusion here. When a CA is installed, an admin user is created. For convenience, this user is placed in various admin groups (including the security domain admin groups) as well as the certificate agent groups. This means that this convenience user is a security domain admin, a regular CA admin, and a CA agent. If you use this default convenience user, then of course the security domain user's password and the admin users password must be the same - because they are one and the same user. In fact, when installing a root CA, the security_domain_password is likely ignored. We expect though that in a real deployment, folks will create their own agents, and may even create separate users to manage the security domain (as opposed to other CA admin tasks). So, if you want to use different passwords for the security domain user, then you should do the following:
I'm not sure there is any work to be done here, except potentially to better document what is needed in the man page. |
Comment from dminnich (@dminnich) at 2015-07-10 17:51:06 That makes sense. We were actually doing the suggested steps but were having issues. I think our issues may have came from setting a different password in the config.txt files than in LDAP. I know at some point we changed passwords in a lot of places and I'm thinking we forgot to update the hash in the LDIF. Anyhow, I can confirm that at least for a master and clone CA setup not connected to an HSM that I can use different accounts and passwords. Feel free to close the ticket. Thanks for the help. |
Comment from nkinder (@nkinder) at 2015-07-10 18:16:09 Thanks for the update Dustin. Closing this ticket. |
Comment from dminnich (@dminnich) at 2017-02-27 14:04:47 Metadata Update from @dminnich:
|
This issue was migrated from Pagure Issue #1431. Originally filed by dminnich (@dminnich) on 2015-06-19 20:49:12:
Recently when working with a CA clone hooked to an HSM mharmsen discovered and that both the pki_security_domain_password and the pki_admin_password must be set to the same value for the CA clone to be stood up successfully.
The text was updated successfully, but these errors were encountered: