Bug 442836 - Need sample profile with EKU for Microsoft smartcard login
Summary: Need sample profile with EKU for Microsoft smartcard login
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Dogtag Certificate System
Classification: Retired
Component: Profile
Version: unspecified
Hardware: All
OS: Linux
high
low
Target Milestone: ---
Assignee: Christina Fu
QA Contact: Chandrasekar Kannan
URL:
Whiteboard:
Depends On:
Blocks: 443788
TreeView+ depends on / blocked
 
Reported: 2008-04-17 05:43 UTC by Bob Lord
Modified: 2015-01-04 23:31 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2009-07-22 23:28:32 UTC
Embargoed:


Attachments (Terms of Use)
The profile example for MS login (11.10 KB, text/plain)
2009-02-27 01:33 UTC, Christina Fu
no flags Details
The corresponding changes needed to register the new profile in CS.cfg (54.11 KB, text/plain)
2009-02-27 01:36 UTC, Christina Fu
no flags Details

Description Bob Lord 2008-04-17 05:43:29 UTC
Description of problem:
I don't see a sample profile that contains the EKU OID for Microsoft smartcard
login.  The OID is 1.3.6.1.4.311.20.2.2

We should have a sample profile that people can use as a starting point for
their custom profiles.

Comment 2 Andrew Bartlett 2008-06-26 01:02:52 UTC
I need this for Samba4 testing with smart cards.  I have a developer who wants
to work on this feature (for Samba), but for me to test his work, I need to
setup a dogtag CA for my test network. 


Comment 4 Christina Fu 2009-02-27 01:33:20 UTC
Created attachment 333419 [details]
The profile example for MS login

Comment 5 Christina Fu 2009-02-27 01:36:10 UTC
Created attachment 333420 [details]
The corresponding changes needed to register the new profile in CS.cfg

Comment 6 Christina Fu 2009-02-27 01:39:58 UTC
You will need patches from 
https://bugzilla.redhat.com/show_bug.cgi?id=481790
and
https://bugzilla.redhat.com/show_bug.cgi?id=487592
to work.

To activate,
* put this profile in <install dir>/profiles/ca
* modify the profile to match your env.  e.g. the basedn for ldap search, hostname and port, crl distribution point.
* update your CS.cfg to have the profile defs (if you are putting this in existin g installation).. if you install new from the newest build, you will not need to do any mod here.
* update TPS's CS.cfg to have a profile pointing to this CA enroll profile,
e.g.
   op.enroll.userKey.keyGen.signing.ca.profileId=caTokenMSLiginEnrollment

NOTE:
It is assumed that you have populated the "upn" in user ldap entries.

Comment 7 Christina Fu 2009-02-27 03:15:22 UTC
already reviewed by awnuk.

$ svn commit conf/CS.cfg profiles/ca/caTokenMSLoginEnrollment.cfg
Sending        conf/CS.cfg
Adding         profiles/ca/caTokenMSLoginEnrollment.cfg
Transmitting file data ..
Committed revision 258.

Comment 8 Jenny Severance 2009-06-18 17:40:46 UTC
Verified:

The following profile exists with Extended Key Usage

Certificate Profile Id: 	caTokenMSLoginEnrollment
Certificate Profile Name: 	Token User MS Login Certificate Enrollment
Description: 	This profile is for enrolling MS Login Certificate 

p15 	

This default populates an Extended Key Usage Extension () to the request. The default values are Criticality=false, OIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.4.1.311.20.2.2
	

No Constraint


Note You need to log in before you can comment on or make changes to this bug.