+++ This bug was initially created as a clone of Bug #1953344 +++ Description of problem: In this environment, keystone is integrated with active directory via LDAPS. The LDAP servers are still using 1024 bit SSL keys which require the crypto policy to be set to LEGACY. The following errors occur in the keystone.log with the DEFAULT crypto policy: "Verification error: EE certificate key too weak" The temporary work-around for 16.1 is not working for 16.2 as per customer # sudo podman exec keystone update-crypto-policies --set LEGACY # sudo systemctl restart tripleo_keystone # sudo podman exec keystone update-crypto-policies --show LEGACY OSP Director should support changing containers' crypto policy or at least inherit the system's current policy during container startup. Version-Release number of selected component (if applicable): 16.2 How reproducible: 100% Steps to Reproduce: 1.see above