Description of problem: ipa-pkinit-manage disable > remove kdc cert > ipa-pkinit-manage enable solution doesn't work correctly for hidden replica, because IPA doesn't consider replica status for this process, and hidden replica isn't a public KDC. Version-Release number of selected component (if applicable): ipa-server-common-4.9.8-7.module+el8.6.0+14337+19b76db2.noarch certmonger-0.79.13-5.el8.x86_64 How reproducible: Always Steps to Reproduce: 1. Install replica 2. Make it hidden with # ipa server-state $HOSTNAME --state=hidden 3. Try to renew cert, either with certmonger resumbission or ipa-pkinit-manage disable > remove kdc cert > pkinit enable Actual results: You end up with self-signed certificate even for replica with CA. Expected results: Either get an informative error (proposing using ipa server-state $HOSTNAME --state=active to do the same) or request the cert from other PKIs Additional info: