You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To avoid mistakes and long debugging sessions, the API shall refuse to import such an invalid certificate or at least provide a warning. Maybe we can do something with another parameter like Boolean force_import
The text was updated successfully, but these errors were encountered:
Sounds reasonable. Expirations may bite us later: It could be that we want to provision clients ahead of time with certificates not yet valid ("Not Before" field).
So the question is: How to define "validity". Do we need to check against a trust store?
At least the "Not After" field should be checked, since we do that upon authorization.
We probably also want to have a standardized error message format for the API, just like OAuth errors have a fixed format.
Currently, the Admin- and Selfservice APIs provide next to no error checking besides authorization.
One is able to import a certificate which is no longer valid via API: PUT call on '/api/v1/config/clients/:client_id/keys'
see: https://github.com/Fraunhofer-AISEC/omejdn-server/blob/master/omejdn.rb#L753
To avoid mistakes and long debugging sessions, the API shall refuse to import such an invalid certificate or at least provide a warning. Maybe we can do something with another parameter like
Boolean force_import
The text was updated successfully, but these errors were encountered: