After applying build 522 the validity period and extensions included in certificates issued via AEP Proxy are NOT as expected
Originally Published: 2013-08-19
Article Number
Applies To
Fedora Auto Enrollment Proxy (AEP)
Microsoft Windows Server 2003
Issue
aep.xuda
Cause
Resolution
Also inspect differences in the following files and update those as well if required:
RSA_CM/WebServer/admin-server/ca/aep/aep-auto-add-request.xuda
RSA_CM/WebServer/admin-server/ca/aep/aep-renew-certificate.xuda
Workaround
Notes
[@useAD='1']
In build 517 (or previous to build 520), when requesting certificates through AEP, the subject of issued cert was taken from Active Directory. In build 520 (and later), the subject DN can be taken from PKCS#10 request. Set useAD flag to 1 (in build 520 or later) to keep the old behavior (use subject DN from AD). Set useAD flag to 0 (in build 520 or later) to use subject DN from PKCS#10. The default behavior remains un changed in newer builds.
An issue around TTL was fixed in build 519. See the following solution for more details:
When issuing a cert via AEP the validity period is always set to 1 year no matter the validity specified in the extension profile/Jurisdiction.
The following new parameter was added to aep-auto-add-request.xuda in build 520 (and also shows up in later builds):
NO_TTL
If NO_TTL flag is set, the value set for directive TTL is ignored and the validity period is taken from jurisdiction configuration when requesting certificates through AEP.
Related Articles
Only get 1 certificate template to enroll successfully using AEP even though there 3 custom V2 templates. 14Number of Views Featured Integrations for RSA SecurID Access 162Number of Views Jamf Pro - SAML Relying Party Configuration - RSA Ready Implementation Guide 12Number of Views Jamf Pro - SAML My Page SSO Configuration - RSA Ready Implementation Guide 32Number of Views Does RSA Security support Windows 2000 Professional for Wireless SecurID authentication to IAS? 26Number of Views
Trending Articles
RSA Authentication Manager Upgrade Process RSA Release Notes for RSA Authentication Manager 8.8 RSA RADIUS Server service failed to start in the RSA Authentication Manager 8.1 Operations Console Microsoft Entra ID External MFA - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide RSA Release Notes: Cloud Access Service and RSA Authenticators
Don't see what you're looking for?