You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When new eHerkenning metadata needs to be provided, in this case for a renewal of a PKI certificate. The "Dienstcatalogus" is generated with the old certificate instead of the future certificate which means while the metadata itself does contain the new and old cert, the old cert needs to be removed temporarily to generate the new "Dienstcatalogus" anyway.
Which defeats the purpose of having both the current and new certificate present in the configuration.
i believe it would be safe to always use the "future" certificate if one is present because if it is - the new metadata and dienstcatalogus are generated for that purpose.
Stappen om te reproduceren / Steps to reproduce
No response
Verwacht gedrag / Expected behavior
No response
Screen resolution
None
Device
None
OS
None
Browser
No response
The text was updated successfully, but these errors were encountered:
I thought the point of communicating the new certificate is so that it can be pro-actively added to the trust store on the eHerkenning side - if we provide new metadata signed with the new certificate that includes the old and new certificate, there's no way for the broker to validate the proper signature of the new metadata, is there?
Refinement: As far as I understand there is a workaround so we don't give it high prio. However, its good that a client encounters this so we get some hands on usage of what we intended as an improvement. Assigning Sergei and Laurens to discuss what Vught does exactly and where the poblem is.
… being used
If a new certificate has been configured and the service catalogue is
being generated again, the expectation is that the next certificate
is included in the metadata rather than the current, because the
latter will (likely) soon expire.
Note that this assumption breaks if users prepare the next
certificate way ahead of time (e.g. it's ready one year
before the current certificate expires), but this seems
mostly a theoretical case since certificates appear to
be issued and then taken into production in a matter of
hours or days.
sergei-maertens
added a commit
to maykinmedia/django-digid-eherkenning
that referenced
this issue
Mar 13, 2025
…ce catalog when it's available
If a next certificate is configured, scheduled to replace the
(expiring) current certificate, use that in favour of the
current certificate when genering the service catalogue
metadata.
Product versie / Product version
2.8.x
Customer reference
Vught 89
Omschrijf het probleem / Describe the bug
When new eHerkenning metadata needs to be provided, in this case for a renewal of a PKI certificate. The "Dienstcatalogus" is generated with the old certificate instead of the future certificate which means while the metadata itself does contain the new and old cert, the old cert needs to be removed temporarily to generate the new "Dienstcatalogus" anyway.
Which defeats the purpose of having both the current and new certificate present in the configuration.
i believe it would be safe to always use the "future" certificate if one is present because if it is - the new metadata and dienstcatalogus are generated for that purpose.
Stappen om te reproduceren / Steps to reproduce
No response
Verwacht gedrag / Expected behavior
No response
Screen resolution
None
Device
None
OS
None
Browser
No response
The text was updated successfully, but these errors were encountered: