You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
OpenLDAP unfortunately does not like encrypted private keys. As it stands, the current output generates encrypted keys always as it directly uses the ruby SSL calls. Interestingly, the PKCS12 export uses the commandline with the -nodes option, which is what we need for the ssl_pkey creation as well.
Ideally, I'd like to have a flag on ssl_pkey and the openssl::certificate::x509 that allows us to turn encryption off.
The text was updated successfully, but these errors were encountered:
OpenLDAP unfortunately does not like encrypted private keys. As it stands, the current output generates encrypted keys always as it directly uses the ruby SSL calls. Interestingly, the PKCS12 export uses the commandline with the -nodes option, which is what we need for the ssl_pkey creation as well.
Ideally, I'd like to have a flag on ssl_pkey and the openssl::certificate::x509 that allows us to turn encryption off.
The text was updated successfully, but these errors were encountered: