ssl - Tomcat does not prompt certificate for web application (OpenAM) -


i have been trouble shooting set of openam while, still not make work wanted. wanted openam able to ocsp validate authenticating user through own copy of ejbca. therefore, need tomcat prompt user certificate , pass openam. visiting openam https fine, , user can login using password (root realm in openam). however, tomcat not prompt user certificate when visiting realm designed certificate login (a sub-realm in openam require certificate). has thought on it? here fragment of server.xml of tomcat configuration related ssl:

    <connector port="8181" protocol="http/1.1"            connectiontimeout="20000"            redirectport="8445" />     <connector port="8445" protocol="http/1.1" sslenabled="true"            maxthreads="150" scheme="https" secure="true"            keystorefile="/opt/sso/apache-tomcat-7.0.52/conf/keystore"            keystorepass="password"            truststorefile="/opt/sso/apache-tomcat-7.0.52/conf/keystore"            truststorepass="password"            clientauth="want" sslprotocol="tls" /> 

there no change web.xml file in case. thanks.

here output of openssl s_client -connect fqdn:8445 per bernhard's suggestion

connected(00000003) depth=1 cn = leopardrootca verify error:num=19:self signed certificate in certificate chain verify return:0 --- certificate chain  0 s:/cn=ncw01271123114/ou=ouname/o=o-name/l=j/st=a/c=us    i:/cn=leopardrootca  1 s:/cn=leopardrootca    i:/cn=leopardrootca --- server certificate -----begin certificate----- miidlzccawc--too_long_too_show -----end certificate----- subject=/cn=ncw01271123114/ou=ouname/o=o-name/l=j/st=a/c=us issuer=/cn=leopardrootca --- acceptable client certificate ca names /cn=leopardrootca /cn=ncw0127114/ou=ouname/o=o-name/l=j/st=a/c=us --- ssl handshake has read 2097 bytes , written 403 bytes --- new, tlsv1/sslv3, cipher dhe-dss-aes256-sha server public key 1024 bit secure renegotiation supported compression: none expansion: none ssl-session:     protocol  : tlsv1     cipher    : dhe-dss-aes256-sha     session-id: 53309aa15c218f41330c077476a3bdae352cafd84a503a281ea09ae884ba73d9     session-id-ctx:      master-key: ef5016a9d8236a704313720fc2e1a1b9fac47a744f6a9b53e80bbef8d1141476e050a71f3c50498abee1f790a2d76891     key-arg   : none     psk identity: none     psk identity hint: none     srp username: none     start time: 1395694241     timeout   : 300 (sec)     verify return code: 19 (self signed certificate in certificate chain) 

as can see following handshake message

acceptable client certificate ca names /cn=leopardrootca /cn=ncw0127114/ou=ouname/o=o-name/l=j/st=a/c=us 

tomcat asking client certificates , accepts certificates issued 1 of certificate authorities.


Comments

Popular posts from this blog

android - Get AccessToken using signpost OAuth without opening a browser (Two legged Oauth) -

org.mockito.exceptions.misusing.InvalidUseOfMatchersException: mockito -

google shop client API returns 400 bad request error while adding an item -