View Issue Details

IDProjectCategoryView StatusLast Update
000982610000-012: DiscoverySpecpublic2024-10-07 05:20
ReporterMatthias Damm Assigned ToRandy Armstrong  
PrioritynormalSeverityminorReproducibilityhave not tried
Status resolvedResolutionfixed 
Product Version1.05.04 RC1 
Target Version1.05.04 
Summary0009826: Handling of ApplicationIdentity and certificate content changes
Description

The ApplicationConfiguration allows the change of ApplicationIdentity that mainly defines the content of certificates.
But it does not define what DNS and IP settings need to be inserted into a certificate. How is this configured?

Changes affect the certificates but 7.10.19 ApplicationIdentityDataType defines:
Applications shall continue to use the invalid Certificates which allows the configuration Client, which is aware of the mismatch, to complete the process needed to update Certificates.

How does a client create a new self-signed certificate if the server should continue to use a self-signed certificate?

Or maybe there should be one endpoint with CA signed and one with self-signed. I am not aware of a option to tell the server to create a new self-signed certificate.

We need more details on when to use the new information and how to trigger creation of new certificates.

TagsNo tags attached.
Commit Version
Fix Due Date

Activities

Randy Armstrong

2024-10-07 05:20

administrator   ~0021838

Added CreateSelfSignedCertificate.

Issue History

Date Modified Username Field Change
2024-09-10 12:47 Matthias Damm New Issue
2024-10-07 05:20 Randy Armstrong Assigned To => Randy Armstrong
2024-10-07 05:20 Randy Armstrong Status new => resolved
2024-10-07 05:20 Randy Armstrong Resolution open => fixed
2024-10-07 05:20 Randy Armstrong Note Added: 0021838