Hi, Rich,

Where you put the ca cert is implementation specific – those locations sound 
reasonable.  You do not need to request a client-only certificate, but if your 
service might need to request a server certificate.

Thanks,
jimmy

From: "TABEDZKI, RICHARD" <rt0...@att.com>
Date: Wednesday, May 2, 2018 at 10:13 AM
To: "FORSYTH, JAMES" <jf2...@att.com>, "onap-discuss@lists.onap.org" 
<onap-discuss@lists.onap.org>
Cc: HARISH V KAJUR <vk2...@att.com>, "GATHMAN, JONATHAN C" <jg1...@att.com>
Subject: RE: AAI using new certificate in Beijing

Jim,

Is it enough then to place AAF_RootCA.cer in /etc/ssl/certs  and import 
truststoreONAP.p12 to /etc/ssl/certs/java/cacerts  or each application still 
needs to request Application Client-Only and Application client certificates?

Thanks,
Rich

From: onap-discuss-boun...@lists.onap.org <onap-discuss-boun...@lists.onap.org> 
On Behalf Of FORSYTH, JAMES
Sent: Wednesday, April 18, 2018 1:03 PM
To: onap-discuss@lists.onap.org
Cc: KAJUR, HARISH V <vk2...@att.com>; GATHMAN, JONATHAN C <jg1...@att.com>
Subject: Re: [onap-discuss] AAI using new certificate in Beijing

***Security Advisory: This Message Originated Outside of AT&T ***
Reference http://cso.att.com/EmailSecurity/IDSP.html for more information.
AAI clients:

Just a reminder that AAI will be changing its server certificate tomorrow at 
the end of the day – you will need to take action to include the AAF root 
certificate in your trust store.

Instructions are here, including keystore files that have been modified to 
include the AAF root:

https://wiki.onap.org/display/DW/AAF+Environment+-+Beijing<https://urldefense.proofpoint.com/v2/url?u=https-3A__wiki.onap.org_display_DW_AAF-2BEnvironment-2B-2D-2BBeijing&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=QzH9_nx-kp6x-cnIqopMqvu4S8LrNfbKJVNxre1GX28&m=3b0rLxCQ8FObL2YX7AqhtW18zzMdBQRVD8PO7tSovs8&s=VRssEilZ3AC16i--8BVi9-BcY8vUn0vlXbbjYtZUWYU&e=>

The integration team is aware of this change and will hopefully be able to 
patch applications that do not update their trustStores, but if you care at all 
about Brian and Marco’s sanity, please update your artifacts in advance 😊

Thanks,
jimmy

From: "FORSYTH, JAMES" <jf2...@att.com<mailto:jf2...@att.com>>
Date: Monday, April 16, 2018 at 4:43 PM
To: "onap-discuss@lists.onap.org<mailto:onap-discuss@lists.onap.org>" 
<onap-discuss@lists.onap.org<mailto:onap-discuss@lists.onap.org>>
Subject: AAI using new certificate in Beijing

Hi, Everyone,

AAI will be replacing its openecomp signed certificate with a new one signed by 
AAF.

https://wiki.onap.org/display/DW/AAF+Environment+-+Beijing#AAFEnvironment-Beijing-RootCertificate.1<https://urldefense.proofpoint.com/v2/url?u=https-3A__wiki.onap.org_display_DW_AAF-2BEnvironment-2B-2D-2BBeijing-23AAFEnvironment-2DBeijing-2DRootCertificate.1&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=QzH9_nx-kp6x-cnIqopMqvu4S8LrNfbKJVNxre1GX28&m=3b0rLxCQ8FObL2YX7AqhtW18zzMdBQRVD8PO7tSovs8&s=y5_3fJmResTvJyMnFnZ2yIarq9o3AT3iP-bsOOGhDRo&e=>

has a link to the AAF root certificate which signed the AAI cert.

AAI’s certificate is issued by: CN=intermediateCA_1, OU=OSAAF, O=ONAP, C=US, 
which is issued by: C=US, O=ONAP, OU=OSAAF

AAI clients – please let me know if you will have issues importing the AAF root 
certificate into your trustStore.  The current plan is to switch the AAI server 
certificates to the new ones signed by AAF at RC0 (this Thursday)

Thanks,
jimmy
_______________________________________________
onap-discuss mailing list
onap-discuss@lists.onap.org
https://lists.onap.org/mailman/listinfo/onap-discuss

Reply via email to