-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SSO Authenticate Error: "error": "self signed certificate" #244
Comments
|
Just had a breakthrough with this - |
When Dynobase first starts an error dialog pops up briefly. I was able to click it to see the error as "self-signed certificate". It's also in the main.log file viewable from the Help menu. I had to use OpenSSL to find which certificate in the chain was the self-signed one causing problems. ChatGPT gave me the following ways to find the self-signed cert: Finding a self-signed certificate in the certificate chain is crucial for understanding where the issue lies, especially when troubleshooting SSL/TLS errors. Here’s a step-by-step guide to identify the self-signed certificate in a certificate chain using different tools and methods:
Step 1: Obtain the Server’s Certificate Chain You can use OpenSSL to connect to the server and retrieve the certificate chain. 1. Install OpenSSL: openssl s_client -showcerts -connect example.com:443 • Replace example.com:443 with the hostname and port of the server you’re connecting to. 3. Examine the Output: -----BEGIN CERTIFICATE----- • OpenSSL outputs each certificate in the chain, starting from the server’s certificate, followed by intermediate certificates, and finally the root certificate. Step 2: Identify the Self-Signed Certificate 1. Save Each Certificate to a File: openssl x509 -in cert1.pem -noout -issuer -subject • A self-signed certificate will have the same issuer and subject. For example: issuer= /C=US/O=Example Org/CN=example.com • If the issuer and subject are identical, the certificate is self-signed.
Step 1: Access the Website 1. Open the Website: Step 2: View the Certificate Chain 1. Chrome:
1. Access SSL Labs’ SSL Test:
Step 1: Retrieve the Certificate Chain 1. Open PowerShell: $certChain = New-Object System.Security.Cryptography.X509Certificates.X509Chain • Replace "C:\path\to\your\certificate.crt" with the path to your certificate file. Step 2: Examine the Chain Elements 1. View the Chain Elements:
1. Capture the Network Traffic: ssl.handshake.type == 11 • This filter shows only the handshake messages, which include the certificate chain. 3. Examine the Certificate Chain: Summary Identifying a self-signed certificate in a certificate chain involves obtaining the chain (using tools like OpenSSL, web browsers, SSL Labs, or Wireshark) and examining the certificates to see if any have the same Issuer and Subject. Once identified, you can determine how to handle the self-signed certificate based on your environment’s needs, such as adding it to a trusted store or replacing it with a valid certificate. Once I found the self-signed certificate I opened the settings in Dynobase, it's the gear icon at the bottom of the left nav panel, and added the .pem file on my file system to the "Custom HTTPS Certificates" text box. I then finally got the authenticate button in Dynobase to forward to my SSO start URL to allow me into AWS via SSO. I did have to follow the instructions Dynobase listed for configuring SSO here: |
I don't know why localhost is getting called when trying to authenticate:
{
"name": "localhost:8000",
"endpointUrl": "http://localhost:8000",
"regions": [
{
"name": "localhost",
"tables": [],
"error": "self signed certificate"
},
{
"name": "local",
"tables": [],
"error": "self signed certificate"
},
{
"name": "us-east-1",
"tables": [],
"error": "self signed certificate"
}
]
}
]
The browse never gets called or opened.
I don't know why "us-east-1" is listed for a region for localhost either.
The text was updated successfully, but these errors were encountered: