Hi Andreas,

Am 07.09.2018 um 14:08 schrieb [email protected]:
Hi Oliver,

Works like a charm now :)
glad to hear ;)

There was a little misunderstanding from myself. I though OpenXPKI will do the 
auth stuff. So after adding the SSLOptions, a correct Server cert/key/chain it 
went as expected :)

Well thats half the truth - the authentication step is split into two parts. The apache handles the TLS authentication and therefore is responsible to ensure the client has access to the private key of the provided certificate but the validation if the certificate is from a trusted CA is done inside OpenXPKI.

You CAN configure your apache using the SSLVerify options to exclude unwanted TLS clients but we do not expect this, so even the "SSLVerifyClient optional_no_ca" is fine for us.

I got one more question ;)

I have in my requests the CN and would like to add other Stuff like OU, O, L 
and so on when issuing the cert.


     enroll:
         subject:
             dn: CN=[% cn %],OU=XXX,O=XXX,L=Berlin,ST=Berlin,C=DE

When requesting over the Gui it works fine but via RPC where I don't enter the 
CN (but is in the REQ) the Subject looks like:
CN=,OU=XXX,O=XXX,L=Berlin,ST=Berlin,C=DE
Short Answer: use "CN=[% CN.0 %]"

Long Answer: The CSR is parsed and stored with the DN attributes as Arrays with attributes names all uppercased. Have a look into the "Workflow Context", you should see the parser result in the key cert_subject_parts there.

Oliver

--
Protect your environment -  close windows and adopt a penguin!


_______________________________________________
OpenXPKI-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openxpki-users

Reply via email to