Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Custom CA from Active Directory #51

Open
sergiobaiao opened this issue Oct 7, 2022 · 0 comments
Open

Custom CA from Active Directory #51

sergiobaiao opened this issue Oct 7, 2022 · 0 comments

Comments

@sergiobaiao
Copy link

sergiobaiao commented Oct 7, 2022

Hi there,

I have an Active Directory infrastructure with an AD Certificate Services running. Is it possible to make pixelserv-tls issue certificates for the client machines based on my own Root CA, so all generated client certificates would be automatically trusted?

I'm using pixelserv-tls on docker. If i take my root ca and key and use them on pixelserv-tls docker volume, and start the docker container using host network, it "kinda" works. But if i use docker port forwarding it doesn't work because the IP Address on the container is different from my network range.

P.S: I've created my root CA with SAN specifying my private network range and local domain.

So, is it possible to generate client certificates from a root CA while specifying SAN subjects?

For example, my RequestPolicy.inf which i use to generate my Root CA has:

2.5.29.17 = "{text}"
continue = "dns=*.mydomain.local&"
continue = "url=https://pihole.mydomain-slz.local&"
continue = "ipaddress=172.0.0.0&"
continue = "guid=f7c3ac41-b8ce-4fb4-aa58-3d1dc0e36b39&"

which is the same as using this in an openssl.cnf file:
alt_names]
DNS.1 = *.mydomain.local
URL.1 = https://pihole.mydomain-slz.local
IP.2 = 172.0.0.0/8

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant