Hi Oliver

The log gave me the right hint, I forgot to install the openca-tools! Sorry for this...
Now I get this in the scep-log which looks way better ;-)

2019/07/16 08:17:54 INFO:2402 Incoming request from 192.168.0.1 with GetCACert
2019/07/16 08:17:54 DEBUG:2402 Response send
2019/07/16 08:17:54 INFO:2402 Incoming request from 192.168.0.1 with PKIOperation
2019/07/16 08:17:59 DEBUG:2402 Response send

openxpki.log shows nothing.
catchall.log shows:

2019/07/16 08:43:12 openxpki.application.INFO SCEP incoming request, id 5256F14B11407EF53F403E6EF809215F [pid=2813|sid=CZwT|sceptid=5256F14B11407EF53F403E6EF809215F] 2019/07/16 08:43:12 openxpki.application.INFO SCEP try to start new workflow for 5256F14B11407EF53F403E6EF809215F [pid=2813|sid=CZwT|sceptid=5256F14B11407EF53F403E6EF809215F] 2019/07/16 08:43:13 openxpki.application.INFO Rendering subject: CN=192.168.0.1,DC=Test Deployment,DC=OpenXPKI,DC=org [pid=2813|sid=CZwT|wftype=certificate_enroll|wfid=29695|sceptid=5256F14B11407EF53F403E6EF809215F] 2019/07/16 08:43:13 openxpki.application.WARN Trusted Signer chain validation FAILED [pid=2813|sid=CZwT|wftype=certificate_enroll|wfid=29695|sceptid=5256F14B11407EF53F403E6EF809215F] 2019/07/16 08:43:13 openxpki.application.INFO Trusted Signer not found in trust list ([email protected],CN=192.168.0.1,OU=Test,O=Test GmbH,L=Test,ST=Test,C=DE). [pid=2813|sid=CZwT|wftype=certificate_enroll|wfid=29695|sceptid=5256F14B11407EF53F403E6EF809215F] 2019/07/16 08:43:13 openxpki.application.INFO SCEP started new workflow with id 29695, state FAILURE [pid=2813|sid=CZwT|sceptid=5256F14B11407EF53F403E6EF809215F] 2019/07/16 08:43:13 openxpki.application.ERROR SCEP Request failed without error code set - default to badRequest [pid=2813|sid=CZwT|sceptid=5256F14B11407EF53F403E6EF809215F]

Can you point me to the right direction? I think I need to edit the workflow, but how to add trusted signer? My scep-server-1.yaml in realm "ca-one" shows this in authorized-signer section, do I have to edit this?

authorized_signer:
    rule1:
        # Full DN
        subject: CN=.+:scepclient,.*
    rule2:
        # Full DN
        subject: CN=.+:pkiclient,.*

Regards
Stefan


Am 16.07.19 um 06:53 schrieb Oliver Welter:
Hi Stefan,

can you plese have a look at the openxpki.log - an empty SCEP response
indicates that something really went wrong...

Oliver

Am 15.07.19 um 18:02 schrieb Stefan:
Hello

I am completely new with openxpki and scep.
I already setup the openxpki server and I am able to sign certificates
over the Web-GUI.

Now I would like to implement scep.
I followed this section:
https://openxpki.readthedocs.io/en/latest/subsystems/scep.html

If I generate a certificate on a fortigate with scep, I get this in the
scep log:

2019/07/15 17:49:56 INFO:1643 Incoming request from 192.168.0.1 with
GetCACert
2019/07/15 17:49:56 DEBUG:1643 Response send
2019/07/15 17:49:56 INFO:1643 Incoming request from 192.168.0.1 with
PKIOperation
2019/07/15 17:49:57 ERROR:1643 SCEP response is empty

Now, I am stuck.
What do I have to configure and what items are necessary to enter on the
fortigate and on the scep server?
The fortigate wants a challenge password, with which password does this
correspond on openxpki?

Are there any examples?
My Idea is to generate a certificate on the fortigate, approve this
request on the Web-GUI of openxpki and then the fortigate gets the
certificate automatically.

Many thanks for any help/hints.

Regards
Stefan


_______________________________________________
OpenXPKI-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openxpki-users




_______________________________________________
OpenXPKI-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openxpki-users

_______________________________________________
OpenXPKI-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openxpki-users

Reply via email to