Sectigo Certificate chain rejected because End entity was signed with SHA1withRSA but my certificate was signed with sha256WithRSAEncryption #1998
Unanswered
ghettosamson
asked this question in
Q&A
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Versions: Keycloak 26.1.0 in Docker and Postgres 16.6-alpine3.20. I am using BouncyCastle for my Keycloak in FIPS mode. My expiring certificate was signed by Entrust and I did not experience this issue. I have a new certificate signed by Sectigo with sha256WithRSAEncryption. I deploy my Postgres with my private key and certificate with chain. When I start my keycloak container and it attempts to connect to Postgres, I get the following error.
Attached find the Sectigo certificate chain.
Sectigo-Chain.txt
Is this a bug? If not, is there a way to tell BC to allow this? I've tried several things like removing the chain from the certificate, but Keycloak then complains that the certificate needs the chain. The way I am specifying the private key and the certificate in Keycloak is via the following environment variables,
KC_HTTPS_CERTIFICATE_KEY_FILE
andKC_HTTPS_CERTIFICATE_FILE
and thats all I am providing. I also tried addingKC_TRUSTSTORE_PATHS
but that didn't help.Beta Was this translation helpful? Give feedback.
All reactions