Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1200731 - [RFE] Support lightweight sub-CAs
[RFE] Support lightweight sub-CAs
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: ipa (Show other bugs)
7.0
Unspecified Unspecified
medium Severity unspecified
: rc
: ---
Assigned To: IPA Maintainers
Namita Soman
Aneta Šteflová Petrová
: FutureFeature
Depends On: 1345755
Blocks: 1351258
  Show dependency treegraph
 
Reported: 2015-03-11 05:59 EDT by Martin Kosek
Modified: 2016-11-04 01:44 EDT (History)
8 users (show)

See Also:
Fixed In Version: ipa-4.4.0-1.el7
Doc Type: Release Note
Doc Text:
IdM now supports sub-CAs Previously, Identity Management (IdM) only supported one certificate authority (CA) that was used to sign all certificates issued within the IdM domain. Now, you can use lightweight sub-CAs for better control over the purpose for which a certificate can be used. For example, a Virtual Private Network (VPN) server can be configured to only accept certificates issued by a sub-CA created for that purpose, rejecting certificates issued by other sub-CAs, such as a smart card CA. To support this functionality, you can now specify an IdM lightweight sub-CA when requesting a certificate with certmonger. For details, see https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html-single/Linux_Domain_Identity_Authentication_and_Policy_Guide/index.html#lightweight-sub-cas
Story Points: ---
Clone Of:
: 1351258 (view as bug list)
Environment:
Last Closed: 2016-11-04 01:44:48 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
tkt_4559.log (8.03 KB, text/plain)
2016-08-19 07:24 EDT, Abhijeet Kasurde
no flags Details
tkt_5999.log (2.11 KB, text/plain)
2016-08-19 07:54 EDT, Abhijeet Kasurde
no flags Details
tkt_5963.log (6.73 KB, text/plain)
2016-08-19 08:17 EDT, Abhijeet Kasurde
no flags Details


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2016:2404 normal SHIPPED_LIVE ipa bug fix and enhancement update 2016-11-03 09:56:18 EDT

  None (edit)
Description Martin Kosek 2015-03-11 05:59:11 EDT
This bug is created as a clone of upstream ticket:
https://fedorahosted.org/freeipa/ticket/4559

In RHEL 7.1, all certificates issued by IPA are interchangeably reusable in different environments, i.e. a certificate issued for mobile device can be used for VPN and vice versa. 

To scope certificates to a specific use without requiring additional access control knobs on behalf of the application that uses the certs, the profiles can be associated with a subCA. 

It should be possible to associate different profiles with different CAs so it should be a many to may relationship.
Comment 2 Martin Kosek 2015-07-07 06:08:36 EDT
FreeIPA upstream project postponed the release to later release:

https://fedorahosted.org/freeipa/ticket/4559#comment:8
Comment 8 Petr Vobornik 2016-06-22 12:28:57 EDT
Upstream ticket:
https://fedorahosted.org/freeipa/ticket/5963
Comment 12 Petr Vobornik 2016-06-29 07:05:37 EDT
Upstream ticket:
https://fedorahosted.org/freeipa/ticket/5999
Comment 16 Petr Vobornik 2016-07-01 09:49:33 EDT
The core of the feature is finished. Moving to modified.

There might be regression or minor parts missing. They should be tracked in separate bugzillas.
Comment 21 Abhijeet Kasurde 2016-08-19 07:02:40 EDT
Observed BZ1368424
Comment 22 Abhijeet Kasurde 2016-08-19 07:24 EDT
Created attachment 1192114 [details]
tkt_4559.log
Comment 23 Abhijeet Kasurde 2016-08-19 07:54 EDT
Created attachment 1192118 [details]
tkt_5999.log
Comment 24 Abhijeet Kasurde 2016-08-19 08:17 EDT
Created attachment 1192121 [details]
tkt_5963.log
Comment 25 Abhijeet Kasurde 2016-08-19 08:19:05 EDT
Verified using IPA version ::
ipa-server-4.4.0-8.el7.x86_64

Marking RFE BZ as verified. Please see attached logs for console log.
Comment 27 errata-xmlrpc 2016-11-04 01:44:48 EDT
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHBA-2016-2404.html

Note You need to log in before you can comment on or make changes to this bug.