Name: | pki-ca |
---|---|
Version: | 10.11.2 |
Release: | 2.0.1.module+el8.5.0+20411+8eb38ccc |
Architecture: | noarch |
Module: | pki-core:10.6:8050020210924095114:01d2cef5 |
Group: | Unspecified |
Size: | 3511575 |
License: | GPLv2 and LGPLv2 |
RPM: | pki-ca-10.11.2-2.0.1.module+el8.5.0+20411+8eb38ccc.noarch.rpm |
Source RPM: | pki-core-10.11.2-2.0.1.module+el8.5.0+20411+8eb38ccc.src.rpm |
Build Date: | Wed Nov 10 2021 |
Build Host: | build-ol8-x86_64.oracle.com |
Vendor: | Oracle America |
URL: | https://www.dogtagpki.org |
Summary: | PKI CA Package |
Description: | The Certificate Authority (CA) is a required PKI subsystem which issues, renews, revokes, and publishes certificates as well as compiling and publishing Certificate Revocation Lists (CRLs). The Certificate Authority can be configured as a self-signing Certificate Authority, where it is the root CA, or it can act as a subordinate CA, where it obtains its own signing certificate from a public CA. |
- Remove upstream reference.
- Bug 2001576 - pki instance creation fails for IPA in FIPS mode
- Rebase to PKI 10.11.2
- Bug 1992337 - Double issuance of non-CA subsystem certs at installation
- Rebase to PKI 10.11.0
- Rebase to PKI 10.11.0-alpha3
- Fix JAVA_HOME
- Rebase to PKI 10.11.0-alpha2
- Rebase to PKI 10.10.4 - Bug 1664435 - Error instantiating class for challenge_password with SCEP request - Bug 1912418 - OCSP and TKS cloning failed due to duplicate replica ID - Bug 1916686 - Memory leak during ACME performance test - Bug 1919282 - ACME cert enrollment failed with HTTP 500
- Rebase to PKI 10.10.3 - Bug 1584550 - CRMFPopClient: unexpected behavior with -y option when values are specified - Bug 1590942 - CMCResponse treats -d as optional - Bug 1890639 - Two-step installation with external certificates fails on HSM configured system - Bug 1912493 - pkispawn reports incorrect FIPS mode