Description of problem:
Setup: Externally signed IdM CA certificate. The external CA certificate is renewed at some point, so that the IdM CA certificate also needs to be renewed:
# ipa-cacert-manage renew --external-ca
# ipa-cacert-manage renew --external-cert-file=/root/ipa-new.crt --external-cert-file=/root/ipa-ca-new.crt
Certmonger shows that the 'caSigningCert' has been renewed successfully. Running the following 'certmonger' command still writes the old IdM CA certificate into '/tmp/foo.crt' though:
# ipa-getcert request -f /tmp/foo.pem -k /tmp/foo.key -F /tmp/foo.crt
Reason for this is that the LDAP entry 'cn=cacert,cn=ipa,cn=etc,$SUFFIX' is not updated with the new IdM CA certificate. A manual update of this entry resolves the problem.
Version-Release number of selected component (if applicable):
Steps to Reproduce:
1. see above
Executing 'ipa-getcert request' uses the old IdM CA certificate.
Executing 'ipa-getcert request' should use the renewed IdM CA certificate.
this BZ looks like a duplicate of BZ 1544470 cn=cacert could show expired certificate (https://bugzilla.redhat.com/show_bug.cgi?id=1544470). Do you agree to close as DUP?
*** This bug has been marked as a duplicate of bug 1544470 ***