Replies: 3 comments 2 replies
-
Can your devs help? |
Beta Was this translation helpful? Give feedback.
-
Thanks, I typed out the log of server.log. The log when I run KUR is as follows: 2022-07-15 09:04:42,817 DEBUG [org.cesecore.configuration.GlobalConfigurationSessionBean] (default task-17) Reading Configuration: AVAILABLE_PROTOCOLS |
Beta Was this translation helpful? Give feedback.
-
According to the log information, the error appears here: Can you guys help me out, what do I need to do to run the KUR request? |
Beta Was this translation helpful? Give feedback.
-
I've solved the problem with runtimes like IR and KUR in client mode. However, in RA mode, the IR request can run normally, but the KUR cannot run normally, and the problem has not been found. In RA mode, is it necessary to add a cmp alisas to the CMP configuration, and then configure it?
Your official manual is too simple to write, it is not good for the basic operations that the CA does not understand.
The cmp alias I added in the CMP configuration of CA UI is opensslra, and the others are not specially configured. The configuration is as follows:
![image](https://user-images.githubusercontent.com/97773232/177897669-23015f40-06e5-49c7-adfd-f55d8da8ea7c.png)
Please help to see what other configuration is needed.
When I run:
![image](https://user-images.githubusercontent.com/97773232/177898006-ffe957fe-5ae4-4a49-aaeb-422109bcba89.png)
openssl cmp -cmd ir -server http://192.168.32.146:8080 -path ejbca/publicweb/cmp/opensslra -srvcert ManagementCA.cacert.pem -ref rauser -secret pass:password -certout cl_cert.pem -newkey cl_key.pem -subject "/CN=rauser/O=sunwave/C=SE" -verbosity 8
It works fine, the terminal prints the following:
The certificate is registered from EJBCA normally, and the corresponding end entity is generated at the same time.
But when I want to renew the certificate:
![image](https://user-images.githubusercontent.com/97773232/177898241-3337af34-fd4a-4449-9c21-2fd2b311839f.png)
openssl cmp -cmd kur -server http://192.168.32.146:8080 -path ejbca/publicweb/cmp/opensslra -srvcert ManagementCA.cacert.pem -verbosity 8 -key cl_key.pem -cert cl_cert.pem -certout cl_new_cert.pem -newkey cl_new_key.pem
Run as follows:
I need some help, I think it's something that is not configured in my CA UI, because I solve the client mode is to do some configuration on the end entity in the CA UI, before I can register the certificate and update the certificate.
Beta Was this translation helpful? Give feedback.
All reactions