-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
tctl and webapi auth export commands fail with multiple active CAs #35444
Comments
I was able to find the following workaround in case anyone else runs into this when setting up Desktop Access with Active Directory:
For the cert authorities of type user, there will be a tls section: spec:
active_keys:
tls:
- public_key: c3N...
- cert: LS0tL... The cert field is what you want. To convert that to DER format, to match what the
If those two certificate authorities are at all different, you will want to import both during the setup step for importing the cert during desktop access setup.
|
during CA rotation there are additional trusted keys that (imo) should also be exported, but we only export a single active key. |
Expected behavior:
When using
tctl auth export --type windows
or accessinghttps://<proxy_address>/webapi/auth/export?type=windows
, even when two active CAs of type 'user' are present, the export should handle and allow for exporting each CA.Current behavior:
Executing
tctl auth export --type windows
or accessing the webapi endpoint when two active CAs of type 'user' are present results in an error:expected one TLS key pair, got 2
. This prevents exporting the necessary certificates for external service configuration, such as Windows service integration.Bug details:
tctl auth export --type windows
.https://<proxy_address>/webapi/auth/export?type=windows
.The text was updated successfully, but these errors were encountered: