Hello Antonio,
if you see a state PENDING, the MAC signature was accepted. The example
eligibility code generates the required approval point if the FQDN used
as the common name ends on "openxpki.test". I am pretty sure you will
see the certificate being issued when you use such a CSR. If you want to
approve any request having a valid HMAC, just set the value in the
eligibility iniital section to a literal "1" as seen in the other
sections. For more details please have a look at the quite extensive
documentataion here
https://openxpki.readthedocs.io/en/stable/reference/configuration/workflows/enroll.html.
Oliver
Regarding a donation: I appreciate this but I do the community support
for fun. If you feel you want to give back something, make a donation to
the United Nations educational program or some other NGO around you feel
comfortable with.
On 12.08.23 22:47, Antonio Gamboa wrote:
Hello Oliver.
A really appreciate your support. I was able to authenticate the RPC
request.
Now, I want to auto-approve the request based on the Eligibility
criteria set in the *my-realm/rpc/enroll.yaml:*
eligible:
initial:
value@: connector:rpc.enroll.connector.intranet
args: '[% context.url_mac %]'
renewal:
value: 1
onbehalf:
value: 1
connector:
intranet:
class: OpenXPKI::Connector::Regex
LOCATION: \w+\.openxpki.test(:[\w]+)?\z
macs:
*In the RPC request:
*
*
*
POST /rpc/enroll?mac=demo.openxpki.test HTTP/1.1
Accept: application/json
Content-Type: application/x-www-form-urlencoded
Host: localhost:8443
Content-Length: 1195
method=RequestCertificate&
pkcs10={CSR}&
comment=test&
signature=a254eb2c1b2087ef190024cc7a3edfb75454a7c77bf8ce0badabeb54bfc2adb7
I am just testing the functionality but have not been successful. I
set the mac in query string with a valid string (must pass the regex
evaluation)
*This is the RPC response I receive :
*
{
"result": {
"pid": 1313,
"retry_after": 300,
"data": {
"error_code": "Request was not approved",
"transaction_id": "b760bc72a3a4281c1550df20c2814d52a5e6b92a"
},
"proc_state": "manual",
"state": "PENDING",
"id": 6143
}
}
What am I missing?
An apology for being such a nuisance. If you are able to
receive donations, I would like to support with a donation.
Best regards.
El dom, 6 ago 2023 a las 1:03, Oliver Welter (<m...@oliwel.de>) escribió:
Hello Antonio,
the HMAC Secret is defined in the rpc/enroll.yaml configuration
and the
expected value is an HMAC256 (hex notation) of the DER encoded CSR.
best regards
Oliver
On 05.08.23 06:36, Antonio Gamboa wrote:
> Hi Oliver.
>
> I could set up the RPC API successfully, thanks.
>
> But, I have the following question, How I could create the
signature
> parameter in the RPC request? It is the HMAC authentication, right?
> I want to send this signature to make an authenticated request in
> order to avoid manual authorization in the UI
>
>
> Best regards.
>
>
> _______________________________________________
> OpenXPKI-users mailing list
> OpenXPKI-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/openxpki-users
--
Protect your environment - close windows and adopt a penguin!
_______________________________________________
OpenXPKI-users mailing list
OpenXPKI-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openxpki-users
_______________________________________________
OpenXPKI-users mailing list
OpenXPKI-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openxpki-users
--
Protect your environment - close windows and adopt a penguin!
_______________________________________________
OpenXPKI-users mailing list
OpenXPKI-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openxpki-users