mirror of
https://github.com/laurivosandi/certidude.git
synced 2026-04-25 00:25:57 +03:00
[GH-ISSUE #35] Feature Request: Publish certificates to LDAP #30
Labels
No labels
pull-request
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/certidude-laurivosandi#30
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @amaccuish on GitHub (Oct 20, 2017).
Original GitHub issue: https://github.com/laurivosandi/certidude/issues/35
If the user is authenticated via LDAP, it would be useful to publish the newly created certificate to the corresponding certificate attribute in Active Directory.
@laurivosandi commented on GitHub (Dec 27, 2017):
Hello, could you please describe a usecase for this? How do you imagine receiving CSR-s in that case?
@amaccuish commented on GitHub (Feb 23, 2018):
The normal request process would apply, but it's useful so users can lookup certificates in Outlook for S/MIME etc.
@laurivosandi commented on GitHub (Feb 23, 2018):
So you're saying you want to publish certificates issued to a particular user under the userCertificate attribute?
@amaccuish commented on GitHub (Feb 23, 2018):
Yes. So if someone authenticated using ldap or kerberos, we can find them in ldap and at time off issuance store the public key in ldap, overwriting usually anything that's there.
@laurivosandi commented on GitHub (Feb 25, 2018):
This should be doable with one constraint - Certidude should not remove other certificates issued by some other CA. I have currently Estonian ID-card certificates attached to the user for example so issuing another certificate from Certidude should not break that.
@amaccuish commented on GitHub (Feb 25, 2018):
I have the exact same. My personal account has both an Estonian ID-card certificate and a internel ca signed cert.
@amaccuish commented on GitHub (Feb 25, 2018):
Maybe include some logic to replace only certificates issued by itself?