Hi, > I agree with you, I am just a newbie in this whole world of PKI and I went > for the easiest way to make it work at the beginning and then start from > there to "make it right". Thanks for the heads up, > > You were right, just that all know what happened, the problems that I faced > was because I messed up running the sampleconfig more than once, even when I > removed everything and started again, the keys in the local folder were still > there and that's why I got the bad results. I delete everything and start > again the process from zero, delete docker containers and volumes and I clean > my configuration. If you follow the quickstart and start the sampleconfig > only **once**, works without problem.
If you plan to set up a PKI for anything remotely resembling a production setup of some sorts I recommend to do proper planning of the PKI. Mistakes in the early phases are sometimes very hard to fix later. If your company needs assistance with this, do not hesitate to contact us via off...@whiterabbitsecurity.com. Our team has been designing and implementing PKIs of any magnitude for a lot of companies in the past years. > I have a last question Oliver; I am really grateful for your time and your > fast response. I notice it that I can only make SCEP successful request with > the first certificate (ca.crt-0) of the chain, for the others I got a > verification error. When I looked at some information about the certificates, > I saw that the ca.crt-0 has as usage: "Digital Signature, Key Encipherment", > so this is a encrypted certificate. Can I use a non-encrypted certificate > like the ca.crt-1 or ca.crt-2? Can this be configured? Or does it have to be > always with the encrypted one? When a SCEP getcacert request is received, the OpenXPKI SCEP server answers with the SCEP RA certificate (always the first certificate in the response) and the CA certificates that form the certificate chain for the RA certificate. The CA Certificate chain (in addition to the separately distributed trusted Root CA) is needed by the end entity performing the SCEP call for creation of the client side keystore. The SCEP RA certificate is needed by the SCEP client for encryption of the SCEP payload. This is the reason why you need to use this for the enrollment. BTW, in case you are working on automation of certificate requests and enrollment, we also have a number of useful tools and standards ways to make this work in an IoT scenario. (hint, hint) Cheers Martin _______________________________________________ OpenXPKI-users mailing list OpenXPKI-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openxpki-users