[Pki-users] failed Administrator logon

Marc Sauton msauton at redhat.com
Wed Oct 29 22:05:32 UTC 2008


Also make sure you have the correct expected java runtime for your platform:
http://pki.fedoraproject.org/wiki/PKI_Runtime_Environments
M.

Klaus Heyden wrote:
> Hello,
>
> i've checked it, the CA is trusted (Firefox Browser). I have also the problem that the Logon with pkiconsole now crashed. The login-window came up after username/password the pkiconsole exits. Tomorrow i will look for the debug-log what happens and also uses the IE for testing.
>
> regards Klaus Heyden
>
>   
>> -----Ursprüngliche Nachricht-----
>> Von: "Marc Sauton" <msauton at redhat.com>
>> Gesendet: 29.10.08 20:38:09
>> An:  Klaus (Allianz ASIC)" <KLAUS.HEYDEN at ALLIANZ.DE>
>> CC: pki-users at redhat.com
>> Betreff: Re: [Pki-users] failed Administrator logon
>>     
>
>
>   
>> Heyden, Klaus (Allianz ASIC) wrote:
>>     
>>> Hello,
>>>  
>>> i have the problem the the CA don't accept the Administrator login. 
>>> Either on HTTPS-interface or via pkiconsole. It's a new installation 
>>> and the Admin-Certificate exists in the Browser with secret key. The 
>>> problem ist that the CA first dor thier job normal. When i now try to 
>>> login i got a catalina error like this. i dont reconfigure the CA only 
>>> restart. I also configured an HSM (Luna) but dont use key's inside the 
>>> HSM.
>>>       
>> You may want to collect the ca debug log when you try to do client auth 
>> in your browser against the https agent pages.
>> Or review the debug log during the ca instance configuration, near the 
>> key generation for the ca instance or when you selected either a 
>> software token or hsm, for any errors.
>> I suppose the ca instance was restarted after the web based wizard 
>> configuration was successfully completed.
>> It is always possible to use another client certificate for an agent or 
>> admin user of the certificate system.
>> You may want to verify the browser has and trust the issuer of the agent 
>> cert you try to use.
>>     
>>> -------------------catalina.out----------------------------------
>>> Oct 29, 2008 5:43:55 PM org.apache.catalina.core.ApplicationContext log"
>>> INFO: caListRequests: You did not provide a valid certificate for this 
>>> operation
>>> ----------------------------------------------------------------------
>>>  
>>> the debug-file shows:
>>> ---------------------debug----------------------------------------
>>> [29/Oct/2008:18:15:07][http-9443-Processor21]: CMSServlet:service() 
>>> uri = /ca/agent/header
>>> [29/Oct/2008:18:15:07][http-9443-Processor21]: CMSServlet::service() 
>>> param name='selected' value='ca'
>>> [29/Oct/2008:18:15:07][http-9443-Processor21]: CMSServlet: caheader 
>>> start to service.
>>> [29/Oct/2008:18:15:07][http-9443-Processor21]: CMSServlet.java: 
>>> renderTemplate
>>> [29/Oct/2008:18:15:07][http-9443-Processor21]: CMSServlet: curDate=Wed 
>>> Oct 29 18:15:07 CET 2008 id=caheader time=0
>>> [29/Oct/2008:18:15:07][http-9443-Processor21]: CMSServlet:service() 
>>> uri = /ca/agent/ca/listRequests.html
>>> [29/Oct/2008:18:15:07][http-9443-Processor21]: CMSServlet: 
>>> caListRequests start to service.
>>> [29/Oct/2008:18:15:07][http-9443-Processor21]: DisplayHtmlServlet 
>>> about to service
>>> [29/Oct/2008:18:15:07][http-9443-Processor21]: IP: 10.94.112.222
>>> [29/Oct/2008:18:15:07][http-9443-Processor21]: AuthMgrName: 
>>> certUserDBAuthMgr
>>> [29/Oct/2008:18:15:07][http-9443-Processor21]: CMSServlet: retrieving 
>>> SSL certificate
>>> [29/Oct/2008:18:15:07][http-9443-Processor21]: 
>>> SignedAuditEventFactory: create() 
>>> message=[AuditEvent=AUTH_FAIL][SubjectID=$Unidentified$][Outcome=Failure][AuthMgr=$Unidentified$][AttemptedCred=$Unidentified$] 
>>> authentication failure
>>> [29/Oct/2008:18:15:08][CRLIssuingPoint-MasterCRL]: getConn: mNumConns 
>>> now 2
>>> [29/Oct/2008:18:15:08][CRLIssuingPoint-MasterCRL]: 
>>> ObjectStreamMapper:mapObjectToLDAPAttributeSet revokedCerts size=84
>>> [29/Oct/2008:18:15:08][CRLIssuingPoint-MasterCRL]: 
>>> ObjectStreamMapper:mapObjectToLDAPAttributeSet unrevokedCerts size=84
>>> [29/Oct/2008:18:15:08][CRLIssuingPoint-MasterCRL]: 
>>> ObjectStreamMapper:mapObjectToLDAPAttributeSet expiredCerts size=84
>>> [29/Oct/2008:18:15:08][CRLIssuingPoint-MasterCRL]: returnConn: 
>>> mNumConns now 3
>>> ----------------------------------------------------------------------
>>>  
>>> certutil -L -d . shows me:
>>> ----------------------------------------------------------------------
>>> Certificate Nickname                                         Trust 
>>> Attributes
>>>                                                              
>>> SSL,S/MIME,JAR/XPI
>>> ocspSigningCert cert-ca4-1                                   u,u,u
>>> subsystemCert cert-ca4-1                                     u,u,u
>>> caSigningCert cert-ca4-1                                     CTu,Cu,Cu
>>> Server-Cert cert-ca4-1                                       u,u,u
>>> Allianz Group Root CA II - Allianz Group                     CT,C,C
>>> ----------------------------------------------------------------------
>>>  
>>>  
>>> reagards
>>> Klaus Heyden
>>>  
>>>  
>>> ------------------------------------------------------------------------
>>>
>>> _______________________________________________
>>> Pki-users mailing list
>>> Pki-users at redhat.com
>>> https://www.redhat.com/mailman/listinfo/pki-users
>>>   
>>>       
>> _______________________________________________
>> Pki-users mailing list
>> Pki-users at redhat.com
>> https://www.redhat.com/mailman/listinfo/pki-users
>>
>>     
>
>
> _________________________________________________________________________
> In 5 Schritten zur eigenen Homepage. Jetzt Domain sichern und gestalten! 
> Nur 3,99 EUR/Monat! http://www.maildomain.web.de/?mc=021114
>
>   




More information about the Pki-users mailing list