> -----Messaggio originale-----
> Da: Jason Pyeron [mailto:jpye...@pdinc.us]
> Inviato: martedì 20 ottobre 2009 13.03
> A: 'Tomcat Users List'
> Oggetto: RE: clent authentication using a smard card
> 
> > -----Original Message-----
> > From: Marcello Marangio [mailto:m.maran...@innova.puglia.it]
> > > Da: Jason Pyeron [mailto:jpye...@pdinc.us]
> > > > From: Marcello Marangio [mailto:m.maran...@innova.puglia.it]
> > > > > Da: Jason Pyeron [mailto:jpye...@pdinc.us]
> > > >
> > > > Ok.
> > > > I made the same thing with IE and in the debug it says "null cert
> > > > chain"
> > > > during the client authentication handshake.
> > > > Now I am confused...
> > > >
> > >
> > > Lets step back and look.
> > >
> > > Can you provide the smart card and server certificate chain
> > (no keys
> > > please)?
> >
> > Hang on a second...
> > The server certificate is an self signed certificate I made
> > with keytool.
> > The smart card certificate, instead, is a real one, I use to
> > legally sign electronic documents; the issuer is an Italian CA.
> >
> > Do you expect the issuer of the smart card certificate to be
> > the same as the server one?
> 
> Not always.
> 
> Lets take for example:
> 
> 
> https://mail.pdinc.us <-PD Inc Public CA<-PD Inc Root CA
> 
>  and
> 
> MySmartCard <- DOD EMAIL CA-15 <- DoD Root CA-2
> 
> The smime cert used on this email
> 
> I can use my smart card to auth againstthe server. But the server must
> know
> about DoD Root CA-2.
> 


Ok. In my case:


https://localhost <- self signed certificate
and
Mysmartcard <- my certificate <- infocamere root CA

And in my trusted certificates keystore there is infocamere root CA.

Please find in attachment a signed text file you can read my cert info from.

Thanks
Marcello

Attachment: myfile.txt.p7m
Description: S/MIME encrypted message

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to