-
Notifications
You must be signed in to change notification settings - Fork 139
PKI 10.5 Database Upgrade
This page describes the process to upgrade a PKI 10.5 database into a PKI 10.6 database.
This procedure fixes the following issue:
Create an upgrade script as follows (customize the parameters as needed):
#!/bin/sh # reset variables # if non default behavior desired userdn="cn=Directory Manager" # Sets the instance to modify instanceId="pki-tomcat" # Database dn of instance to modify database="pki-tomcat-CA" rootSuffix="o=pki-tomcat-CA" # Important value of the CA's issuer dn. # Can be found in the pretty print of the CA's signing cert, easily found in the EE interface GUI. caIssuerDN="cn=CA Signing Certificate,ou=pki-tomcat,o=host.com Security Domain" # Port and host name values where the LDAP in question is running. port=389 hostname="localhost.localdomain" ldapmodify -a -D "$userdn" -W -p $port -h $hostname -x << EOF dn: cn=allRevokedCertsByIssuer-$instanceId, cn=$database, cn=ldbm database, cn=plugins, cn=config objectClass: top objectClass: vlvSearch cn: allRevokedCertsByIssuer-$instanceId vlvBase: ou=certificateRepository,ou=ca,$rootSuffix vlvScope: 1 vlvFilter: (&(certStatus=REVOKED)(|(!(issuerName=*))(issuerName=$caIssuerDN))) dn: cn=allRevokedCertsByIssuer-${instanceId}Index, cn=allRevokedCerts-$instanceId, cn=$database, cn=ldbm database, cn=plugins, cn=config objectClass: top objectClass: vlvIndex cn: allRevokedCertsByIssuer-${instanceId}Index vlvSort: serialno vlvEnabled: 0 vlvUses: 0 dn: cn=index1160589779, cn=index, cn=tasks, cn=config objectclass: top objectclass: extensibleObject cn: index1160589779 ttl: 10 nsinstance: $database nsindexVLVAttribute: allRevokedCertsByIssuer-$instanceId EOF
Execute the upgrade script. After being prompted for the userdn’s password, the script will attempt to create the new VLV index and to create a "task" on the server to install the index.
Note, if the index already exists, the call to ldapmodify will simply report that the object already exists and exit.
This procedure fixes the following issue:
To add the missing Auditors group to TPS:
$ ldapmodify -x -D "cn=Directory Manager" -w Secret.123 << EOF dn: cn=Auditors,ou=Groups,{rootSuffix} changeType: add objectClass: top objectClass: groupOfUniqueNames cn: Auditors description: People who can read the signed audit logs for TPS EOF
Replace {rootSuffix}
with the base DN of from the TPS configuration file (pki_ds_base_dn
). Usually this is something like dc=tks,dc=pki,dc={DOMAIN…},dc={TLD}
.
There are no required changes.
Tip
|
To find a page in the Wiki, enter the keywords in search field, press Enter, then click Wikis. |