You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
I would like to be able to represent nested organizational units in the Vault-generated certificates' subject name in the same way that other directory services and openssl allow.
Describe the solution you'd like
It would be absolutely great if I could somehow specify the Subject for the CSR. Whether that be through a syntax similar to OpenSSL (e.g. subj='/CN=Dacoda Strack/OU=Subgroup/OU=Information Technology/O=Dacoda Strack LLC/') or by passing through some base64 encoded DER.
The reason I mention the base64 encoded DER is that in the documentation for Golang's pkix.Name (which I believe Vault is using to create the subject), it says
If an accurate representation is needed, asn1.Unmarshal the raw subject or issuer as an RDNSequence.
I imagine calling something like this from my shell.
Describe alternatives you've considered
I can specify multiple organizational units through the API, but they are encoded differently that expected from, say, OpenSSL or AD.
Explain any additional use-cases
Additional context
Here is a somewhat human-readable representation of the DER that I get from vault...
+1 on this feature request since we also have a need of a hierarchial structure with multiple OUs in our certificates. It would be nice if it would be possible to configure a role how it should handle RDNs that occur multiple times in the CSR subject.
A more detailed discussion from Golang perspective here: golang/go#40876
Just to consolidate discussion, I'll close this one in favor of #12426. As documented there, rdn= seems to have the desired structure, it is just that validation becomes much harder. Previously we only needed validation attributes for the cn= component, as the others were specified by the operator on the role.
Now however, we need to be able to validate not only the contents of each type, but perhaps also the overall structure of the request.
If anyone has thoughts, I'd appreciate them on that tissue. :-)
Is your feature request related to a problem? Please describe.
I would like to be able to represent nested organizational units in the Vault-generated certificates' subject name in the same way that other directory services and
openssl
allow.Describe the solution you'd like
It would be absolutely great if I could somehow specify the Subject for the CSR. Whether that be through a syntax similar to OpenSSL (e.g.
subj='/CN=Dacoda Strack/OU=Subgroup/OU=Information Technology/O=Dacoda Strack LLC/'
) or by passing through some base64 encoded DER.The reason I mention the base64 encoded DER is that in the documentation for Golang's pkix.Name (which I believe Vault is using to create the subject), it says
I imagine calling something like this from my shell.
Describe alternatives you've considered
I can specify multiple organizational units through the API, but they are encoded differently that expected from, say, OpenSSL or AD.
Explain any additional use-cases
Additional context
Here is a somewhat human-readable representation of the DER that I get from vault...
I am looking for a way to ask Vault to produce a certificate more like...
Here are the base64 encoded DERs for the two:
Vault distinguished name with multi-valued RDNs
Distinguished name with no multi-valued RDNs a la Active Directory and others
For example,
The text was updated successfully, but these errors were encountered: