![]() ![]() When a user is migrated from a remote LDAP, the user's entry in the Directory Server does not contain Kerberos credentials needed for a Kerberos login. Identity Management component, BZ# 822350 Using this work around, the certificate subject validation procedure succeeds and the installation continues as expected. If a custom subject was used for the first stage of the installation, use its value instead. To work around this issue, add the following option for the second stage of the installation: -subject "O=$REALM" where $REALM is the realm of the new Identity Management installation. Consequently, the second stage of the installation process always fails unless the -subject option is specified. ![]() However, there is a bug in the certificate subject validation procedure and its default value ( O=$REALM, where $REALM is the realm of the new Identity Management installation) is never pulled. During the second stage of the installation, a signed Identity Management CA certificate subject is validated. The second stage of the installation then accepts a file with the new signed certificate for the Identity Management CA and a certificate of the external CA. In the first stage, a CSR is generated to be signed by an external CA. When Identity Management is installed with its CA certificate signed by an external CA, the installation is processed in 2 stages. Red Hat Enterprise Linux Release Notesħ.240. Important Changes to External Kernel ParametersĬollapse section "4. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |