#8087 Implicit CA ACL for IPA services
Opened 4 years ago by ftweedal. Modified 3 years ago

Request for enhancement

Disabling the default CA ACL can cause issues. Indeed, we want to avoid any situation where renewal of IPA system certs can fail due to administrator disabling a CA ACL.

Therefore, hard code the following rule in the cert_request command:

  • If the operator principal is an IPA server host pricipal
  • and the subject principal is a service type HTTP/ or ldap/ for the same host
  • then allow the caIPAserviceCert profile to be used (CA ACLs need not be consulted)

Tests should be written that disable CA ACLs and check that HTTP/ldap cert renewals work.

Also need to check how the KDC certificate fits into this picture.

Also need to check what happens during replica installation (e.g. what principal requests the certificates; does the above rule handle this scenario or is something more needed?)


Metadata Update from @ftweedal:
- Assignee reset

3 years ago

Login to comment on this ticket.

Metadata