You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The audit command was originally added to TPS (pki tps-audit) and it's fully functional. The man page will be added soon.
Ideally other subsystems should provide the same audit command and currently the CLI and REST service for audit have already been added to those subsystems too. However, currently it doesn't work because it's still missing the ACL in the database (hence the "No user principal provided" error message). Since database upgrade framework (710) is not implemented yet, the ACL cannot be added automatically to existing non-TPS instances.
Possible short term solutions:
Option 1: Ask admins to add the ACL to existing non-TPS subsystems manually.
Option 2: Remove the audit command from non-TPS subsystems until 710 is implemented.
This issue was migrated from Pagure Issue #1437. Originally filed by mharmsen (@mharmsen) on 2015-06-22 18:25:41:
There is no man page for pki kra-audit command line.
Example: when i run kra-audit-mod i get the error No user principal provided
pki -d /opt/rhqa_pki/certs_db/ -u kra3admin -w Secret123 -h pki2.example.org -p
30490 kra-audit-mod --action enable
ForbiddenException: No user principal provided.
What does user principal mean here ?
Steps to Reproduce:
Actual results:
Expected results:
The text was updated successfully, but these errors were encountered: