<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <tt>Please review the attached patch which addresses </tt><tt>the
      following two 'pki-silent' issues in RHCS 8.1:</tt><tt><br>
    </tt>
    <ul>
      <li><tt><a
            href="https://bugzilla.redhat.com/show_bug.cgi?id=951891"><b>Bugzilla
              Bug #951891</b></a></tt><tt> -</tt><tt><span
            id="summary_alias_container"> <span
              id="short_desc_nonedit_display">'silent_ra_to_ip_port.template'
              fails to configure an RA successfully</span></span></tt></li>
      <li><tt><a
            href="https://bugzilla.redhat.com/show_bug.cgi?id=952392"><b>Bugzilla
              Bug #952392</b></a></tt><tt> -</tt><tt><span
            id="summary_alias_container"> <span
              id="short_desc_nonedit_display">Allow RA and TPS URLs to
              be specified by pkisilent and utilized by the RA and TPS
              servers</span></span></tt></li>
    </ul>
    <tt><span id="summary_alias_container"><span
          id="short_desc_nonedit_display">This patch has been tested
          extensively on an IP Port Separated x86_64 machine running
          RHEL 5.9.</span></span></tt><tt><br>
    </tt><tt><span id="summary_alias_container"><span
          id="short_desc_nonedit_display"></span></span></tt><tt><br>
    </tt><tt><span id="summary_alias_container"><span
          id="short_desc_nonedit_display">Testing utilized the following
          deployment scenario:</span></span></tt><tt><br>
    </tt><tt><span id="summary_alias_container"><span
          id="short_desc_nonedit_display"></span></span></tt>
    <ul>
      <li><tt>CA (security domain)</tt></li>
      <ul>
        <li><tt>Subordinate CA (no security domain)</tt></li>
        <ul>
          <li><tt>KRA</tt></li>
          <li><tt>TKS</tt></li>
          <li><tt>RA</tt></li>
          <li><tt>TPS</tt></li>
        </ul>
      </ul>
    </ul>
    <tt>The KRA, RA, and TPS were tested both by signing the subsystems
      certificates with the CA and again with the Subordinate CA; this
      testing led to the filing of "TRAC Ticket #620 - </tt><tt>Ability
      of a non-security domain CA to store an "Administration" cert in
      the NSS client security database".</tt><br>
    <br>
    <tt></tt><tt> </tt>
  </body>
</html>