Yeah, I'm still not getting this, and I'm probably missing something
I follow the steps here:
1. Log into the server for which I need the cert.
2. # certutil -R -d /etc/pki/nssdb -a -g 2048 -s
"CN=testesk1.internal.net,O=INTERNAL.NET" > ssl.csr
I then copy the contents of the csr file and paste it into the FreeIPA
UI after selecting Actions->New Certificiate from the Host Settings page.
3. I then click Actions->Get Certificate on that same page to extract
the contents and paste it into a new .pem file on the requesting host.
But how do I get at the key that was used in the creation of this cert?
I can get the cacert, and I've got the newly-issued cert, but what about
On 09/27/2016 02:00 PM, Bret Wortman wrote:
That looks like it worked, but I have a follow-on question:
I need to provide my RabbitMQ instance with a cacert file, a cert, and
a key file. These seem to be .pem files. Is there an easy way to
gather these 3 files from a typical IPA client node?
On 09/27/2016 11:28 AM, Florence Blanc-Renaud wrote:
would the following be helpful? In "Linux Domain Identity,
Authentication, and Policy Guide", Chapter 17.1.1 Requesting New
Certificates for a User, Host, or Service 
On 09/27/2016 04:20 PM, Bret Wortman wrote:
Is there a guide anywhere for how to obtain an SSL certificate for a
server & service from the IPA CA master? Most of the guides I'm seeing
online use web pages at the major CAs to do this and I'd like to
in the family.
Manage your subscription for the Freeipa-users mailing list:
Go to http://freeipa.org for more info on the project