![]() ![]() Consequently, the second stage of the installation process always fails unless the -subject option is specified. However, there is a bug in the certificate subject validation procedure and its default value ( O=$REALM, where $REALM is the realm of the new Identity Management installation) is never pulled. During the second stage of the installation, a signed Identity Management CA certificate subject is validated. The second stage of the installation then accepts a file with the new signed certificate for the Identity Management CA and a certificate of the external CA. In the first stage, a CSR is generated to be signed by an external CA. When Identity Management is installed with its CA certificate signed by an external CA, the installation is processed in 2 stages. Red Hat Enterprise Linux Release Notesħ.240. Important Changes to External Kernel ParametersĬollapse section "4.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |