Questo contenuto non è disponibile nella lingua selezionata.
27.3. Configuring PKINIT in IdM
If your IdM servers are running with PKINIT disabled, use these steps to enable it. For example, a server is running with PKINIT disabled if you passed the
--no-pkinit option with the ipa-server-install or ipa-replica-install utilities.
Prerequisites
- Ensure that all IdM servers with a certificate authority (CA) installed are running on the same domain level. See Chapter 7, Displaying and Raising the Domain Level for details.
Procedure
- Check if PKINIT is enabled on the server:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow If PKINIT is disabled, you will see the following output:Copy to Clipboard Copied! Toggle word wrap Toggle overflow You can also use the command to find all the servers where PKINIT is enabled if you omit the--server <server_fqdn>parameter. - If you are using IdM without CA:
- On the IdM server, install the CA certificate that signed the Kerberos key distribution center (KDC) certificate:
ipa-cacert-manage install -t CT,C,C ca.pem
# ipa-cacert-manage install -t CT,C,C ca.pemCopy to Clipboard Copied! Toggle word wrap Toggle overflow - To update all IPA hosts, repeat the ipa-certupdate command on all replicas and clients:
ipa-certupdate
# ipa-certupdateCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Check if the CA certificate has already been added using the ipa-cacert-manage list command. For example:
ipa-cacert-manage list
# ipa-cacert-manage list CN=CA,O=Example Organization The ipa-cacert-manage command was successfulCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Use the ipa-server-certinstall utility to install an external KDC certificate. The KDC certificate must meet the following conditions:
- It is issued with the common name
CN=fully_qualified_domain_name,certificate_subject_base. - It includes the Kerberos principal
krbtgt/REALM_NAME@REALM_NAME. - It contains the Object Identifier (OID) for KDC authentication:
1.3.6.1.5.2.3.5.
ipa-server-certinstall --kdc kdc.pem kdc.key systemctl restart krb5kdc.service
# ipa-server-certinstall --kdc kdc.pem kdc.key # systemctl restart krb5kdc.serviceCopy to Clipboard Copied! Toggle word wrap Toggle overflow - See your PKINIT status:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
- If you are using IdM with a CA certificate, enable PKINIT as follows:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow If you are using an IdM CA, the command requests a PKINIT KDC certificate from the CA.
Additional Resources
- For more information, see ipa-server-certinstall(1) man page.