Hello,
IPA version 4.6.8.
Got a host that doesn't allow user logins, but was joined at some point to the
domain.
Everything that I can think of to check appears to be working
Log into client system with local credentials
Logs show invalid user attempts
Client
either.
Thanks!
David Patterson
-Original Message-
From: Rob Crittenden
Sent: Monday, January 11, 2021 11:07 AM
To: FreeIPA users list
Cc: Patterson, David
Subject: [EXTERNAL] Re: [Freeipa-users] ipa healthcheck issue
Patterson, David via FreeIPA-users wrote:
> Hello,
>
Hello,
Running RHEL 7.9, ipa 4.6.8-5 and freeipa-healthcheck 0.3-2 backported for RHEL
7.
Ipa healthcheck output
[
{
"source": "ipahealthcheck.ipa.certs",
"kw": {
"msg": "Unable to retrieve cert 'host/idm2.X.Y' from '/etc/pki/nssdb':
Failed to get host/idm2.X.Y",
It istry escaping them \(.
David
-Original Message-
From: Rob Crittenden via FreeIPA-users
Sent: Wednesday, July 15, 2020 11:54 AM
To: FreeIPA users list
Cc: Sumit Bose ; Shane Frasier
; Rob Crittenden
Subject: [EXTERNAL] [Freeipa-users] Re: certmapdata issue
Shane Frasier via
sers@lists.fedorahosted.org
Cc: Sumit Bose
Subject: [EXTERNAL] [Freeipa-users] Re: Keys vs certificates
On Tue, Aug 27, 2019 at 02:43:22PM +0000, Patterson, David via FreeIPA-users
wrote:
> Hello,
>
> I followed the instructions from this page
> (https://frasertweedale.github.io/blog-redhat/
Hello,
I followed the instructions from this page
(https://frasertweedale.github.io/blog-redhat/posts/2015-08-06-freeipa-custom-certprofile.html)
to create User Certificates.
While testing I noticed that when I create a User Cert for an account, the ssh
keys stopped working for that same
The profile: it literally was the caUserCert.cfg profile with a few minor
changes: Removed rsa 1024 key length and removed MD5 encryption algorithms.
Command sequence:
Add the modified profile: ipa certprofile-import caUserCert --file
caUserCert_mod.cfg --store TRUE --desc "User certificate