26.5. Allowing IdM to Start with Expired Certificates
After the IdM administrative server certificates expire, most IdM services become inaccessible. You can configure the underlying Apache and LDAP services to allow SSL access to the services even if the certificates are expired.
If you allow limited access with expired certificates:
- Apache, Kerberos, DNS, and LDAP services will continue working. With these services active, users will be able to log in to the IdM domain.
- Client services that require SSL for access will still fail. For example,
sudowill fail because it requires SSSD on IdM clients, and SSSD needs SSL to contact IdM.
Important
This procedure is intended only as a temporary workaround. Renew the required certificates as quickly as possible, and then revert the described changes.
- Configure the
mod_nssmodule for the Apache server to not enforce valid certificates.- Open the
/etc/httpd/conf.d/nss.conffile. - Set the
NSSEnforceValidCertsparameter tooff:NSSEnforceValidCerts off
NSSEnforceValidCerts offCopy to Clipboard Copied! Toggle word wrap Toggle overflow
- Restart Apache.
systemctl restart httpd.service
# systemctl restart httpd.serviceCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Make sure that validity checks are disabled for the LDAP directory server. To do this, verify that the
nsslapd-validate-certattribute is set towarn:ldapsearch -h server.example.com -p 389 -D "cn=directory manager" -w secret -LLL -b cn=config -s base "(objectclass=*)" nsslapd-validate-cert
# ldapsearch -h server.example.com -p 389 -D "cn=directory manager" -w secret -LLL -b cn=config -s base "(objectclass=*)" nsslapd-validate-cert dn: cn=config nsslapd-validate-cert: warnCopy to Clipboard Copied! Toggle word wrap Toggle overflow If the attribute is not set towarn, change it:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Restart the directory server.
systemctl restart dirsrv.target
# systemctl restart dirsrv.targetCopy to Clipboard Copied! Toggle word wrap Toggle overflow