Bug 974482 - RFE: add freeipa CA to the system-wide trust store
Summary: RFE: add freeipa CA to the system-wide trust store
Keywords:
Status: CLOSED DUPLICATE of bug 928478
Alias: None
Product: Fedora
Classification: Fedora
Component: freeipa
Version: 19
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Rob Crittenden
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-06-14 09:13 UTC by David Jaša
Modified: 2013-06-14 11:03 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2013-06-14 11:03:21 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)

Description David Jaša 2013-06-14 09:13:24 UTC
Description of problem:
Fedora from F19 on has a shared trust store where CA's can be added and removed on the fly. [1] FreeIPA should add it's CA there as well if it creates one. CLI instructions to achieve that are described at [2].

[1] https://fedoraproject.org/wiki/Features/SharedSystemCertificates
[2] https://fedoraproject.org/wiki/Features/SharedSystemCertificates:Testing#How_to_add_a_systemwide_CA

IMO it's in FreeIPA scope to manage CAs in the clients, too, but that's matter for another RFE (that would span SSSD, too).

Version-Release number of selected component (if applicable):
freeipa 3.2

How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:

Comment 1 Martin Kosek 2013-06-14 11:03:21 UTC
Good point. Current plan is to do that in Fedora 20 as I think it won't be just a matter of just running these 2 commands. IPA also configures other services and their certificates (ldap, http), we also have several certificate operation modes (dogtag vs. ca-less install) which needs to be well thought through.

Anyway, marking this Bug as duplicate to Bug 928478 which was already filed for Fedora.

*** This bug has been marked as a duplicate of bug 928478 ***


Note You need to log in before you can comment on or make changes to this bug.