Is your cert signed by a private CA?
---
Jared F. Nichols
Desktop Engineer, Client Services
Information Services Department
MIT Lincoln Laboratory
244 Wood Street
Lexington, Massachusetts 02420
781.981.5436
You should be able to navigate to your JSS in a web browser from any of
On 9/29/11 11:23 AM, "Don Montalvo" <donmontalvo at gmail.com> wrote:
the problem machines and check the cert there. Click the lock icon in the
browser to view.
--
William Smith
Technical Analyst
Merrill Communications LLC
(651) 632-1492
Hi Jared,
Yes it was created as per the below article and worked for months:
http://jamfsoftware.com/kb/article.php?id=019
Per this article we deselected the cert option, pending confirmation the certificate is still valid since we moved from 7.1 to 7.31:
http://jamfsoftware.com/kb/article.php?id=051
Thanks,
Don
Hi William,
Long time no see.
Ya, we actually get this error when we try to enable the checkbox in JSS:
http://donmontalvo.com/jamf/JSS_invalid_certificate.png
Not sure how it could break. We have our team looking into it.
Just curious...is the "-k" option in QuickAdd postflight force it to require valid cert?
####################################################
## Create the configuration file at /private/etc/jamf.conf
####################################################
/usr/sbin/jamf createConf -url 'https://*:8443/' -k
Don
Using a client system that hasn't checked in, can you look at the trust chain and see what the client thinks the trust status is?
j
---
Jared F. Nichols
Desktop Engineer, Client Services
Information Services Department
MIT Lincoln Laboratory
244 Wood Street
Lexington, Massachusetts 02420
781.981.5436
Yes the -k flag will require a valid cert.
j
---
Jared F. Nichols
Desktop Engineer, Client Services
Information Services Department
MIT Lincoln Laboratory
244 Wood Street
Lexington, Massachusetts 02420
781.981.5436
Doing some house cleaning on threads I left open-ended. Turns out "-k" tells the Casper agent to not care about the cert. Enabling the cert in JSS triggers removal of the "-k" on the client side. So if you enable the cert today and disable the cert tomorrow, clients won't call in anymore (unless you're able to add "-k" back on the client.
Adding the -k works for policies, but I found that you need to select the "Allow Invalid Certificate" box in the preferences for Casper Remote or it locks up again.
So looks like Certs signed by a private CA will not work?