Hello,
I have been tasked with installing FreeIPA in our environment to help manage 
certificates for Postgres, NGINX and RabbitMQ. I am completely new to the 
administrative side of certificates, so I may have made some incorrect 
assumptions. We have decided to use LetsEncrypt as our external CA, so I ran 
the FreeIPA install:

    sudo ipa-server-install --realm MYDOMAIN.COM --domain mydomain.com 
--setup-dns --auto-forwarders --allow-zone-overlap --external-ca --ca-subject 
"CN=mydomain.com"

This produced a CSR which I have had signed by LetsEncrypt (I also tried to 
sign the CSR with with gethttpsforfree, but got the same results):

    sudo certbot --csr /root/ipa.csr --preferred-challenges dns certonly

As I understand it, it should be as simple at this point to rerun 
ipa-server-install with external-cert-file arguments for the signed CSR file 
and the existing trust chain.

    sudo ipa-server-install --external-cert-file=/path/to/file/signed_csr.pem 
--external-cert-file=/etc/letsencrypt/live/mydomain.com/fullchain.pem

This results in an error I can't wrap my head around:

    ERROR: CA Certificate CN=mydomain.com in <signed CSR file>, <trust chain 
file> is not valid: not a CA certificate.

After getting this certificate chain in FreeIPA I plan on creating a couple 
more layers of intermediate certificates and, eventually, create root 
certificates for the individual services. What assumption am I making that is 
causing this process to go sideways? I could not really find anything in the 
volumes of documentation I have gone through so far.
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]

Reply via email to