Name: | pki-kra |
---|---|
Version: | 10.11.2 |
Release: | 2.0.1.module+el8.5.0+20411+8eb38ccc |
Architecture: | noarch |
Module: | pki-core:10.6:8050020210924095114:01d2cef5 |
Group: | Unspecified |
Size: | 632146 |
License: | GPLv2 and LGPLv2 |
RPM: | pki-kra-10.11.2-2.0.1.module+el8.5.0+20411+8eb38ccc.noarch.rpm |
Source RPM: | pki-core-10.11.2-2.0.1.module+el8.5.0+20411+8eb38ccc.src.rpm |
Build Date: | Wed Nov 10 2021 |
Build Host: | build-ol8-x86_64.oracle.com |
Vendor: | Oracle America |
URL: | https://www.dogtagpki.org |
Summary: | PKI KRA Package |
Description: | The Key Recovery Authority (KRA) is an optional PKI subsystem that can act as a key archival facility. When configured in conjunction with the Certificate Authority (CA), the KRA stores private encryption keys as part of the certificate enrollment process. The key archival mechanism is triggered when a user enrolls in the PKI and creates the certificate request. Using the Certificate Request Message Format (CRMF) request format, a request is generated for the user's private encryption key. This key is then stored in the KRA which is configured to store keys in an encrypted format that can only be decrypted by several agents requesting the key at one time, providing for protection of the public encryption keys for the users in the PKI deployment. Note that the KRA archives encryption keys; it does NOT archive signing keys, since such archival would undermine non-repudiation properties of signing keys. |
- Remove upstream reference.
- Bug 2001576 - pki instance creation fails for IPA in FIPS mode
- Rebase to PKI 10.11.2
- Bug 1992337 - Double issuance of non-CA subsystem certs at installation
- Rebase to PKI 10.11.0
- Rebase to PKI 10.11.0-alpha3
- Fix JAVA_HOME
- Rebase to PKI 10.11.0-alpha2
- Rebase to PKI 10.10.4 - Bug 1664435 - Error instantiating class for challenge_password with SCEP request - Bug 1912418 - OCSP and TKS cloning failed due to duplicate replica ID - Bug 1916686 - Memory leak during ACME performance test - Bug 1919282 - ACME cert enrollment failed with HTTP 500
- Rebase to PKI 10.10.3 - Bug 1584550 - CRMFPopClient: unexpected behavior with -y option when values are specified - Bug 1590942 - CMCResponse treats -d as optional - Bug 1890639 - Two-step installation with external certificates fails on HSM configured system - Bug 1912493 - pkispawn reports incorrect FIPS mode