Skip to content

Commit e915af9

Browse files
authored
common issue Internal LibreIDM cert expires (#722)
* common issue Internal LibreIDM cert expires * refining text
1 parent 03855bc commit e915af9

2 files changed

Lines changed: 108 additions & 0 deletions

File tree

docs/admin/resources/common-issues.md

Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -144,3 +144,56 @@ sudo docker run -it --rm -v opencloud-compose_opencloud-data:/var/lib/opencloud
144144
```bash
145145
docker compose up -d
146146
```
147+
148+
## Internal LibreIDM cert expires
149+
150+
### 🔧 Renewing an expired certificate in internal IDM (OpenCloud)
151+
152+
When using the internal IDM (LibreIDM), the LDAP certificate may expire over time.
153+
You can see similar errormessages in your logfiles:
154+
155+
```bash
156+
opencloud-1 | 2026-03-10T14:10:36Z WRN core access token not set host.name=3133c92656c8 pkg=rhttp service=frontend traceid=2da2886cf47f0143876953ee33f814a9
157+
opencloud-1 | 2026-03-10T14:10:36Z ERR failed to build subject.session error="invalid key format" service=proxy
158+
opencloud-1 | 2026-03-10T14:10:36Z ERR handleConnection ber.ReadPacket error="remote error: tls: bad certificate" service=idm
159+
opencloud-1 | 2026-03-10T14:10:37Z ERR could not get ldap Connection error="LDAP Result Code 200 \"Network Error\": tls: failed to verify certificate: x509: certificate has expired or is not yet valid: current time 2026-03-10T14:10:37Z is after 2026-03-04T10:02:39Z" service=graph
160+
opencloud-1 | 2026-03-10T14:10:37Z ERR failed to add user error="LDAP Result Code 200 \"Network Error\": tls: failed to verify certificate: x509: certificate has expired or is not yet valid: current time 2026-03-10T14:10:37Z is after 2026-03-04T10:02:39Z" request-id=3133c92656c8/LlC0SVlYb4-000023 service=graph
161+
opencloud-1 | 2026-03-10T14:10:37Z ERR handleConnection ber.ReadPacket error="remote error: tls: bad certificate" service=idm
162+
opencloud-1 | 2026-03-10T14:10:37Z ERR could not create user: backend error error="generalException: failed to add user" request-id=3133c92656c8/LlC0SVlYb4-000023 service=graph
163+
opencloud-1 | 2026-03-10T14:10:37Z WRN Error Response OData Error="failed to add user" service=proxy
164+
opencloud-1 | 2026-03-10T14:10:37Z ERR Error creating user error="500 Internal Server Error" service=proxy
165+
opencloud-1 | 2026-03-10T14:10:37Z ERR Autoprovisioning user failed error="500 Internal Server Error" service=proxy
166+
```
167+
168+
#### 🛠️ Solution
169+
170+
Navigate to the IDM directory
171+
172+
```bash
173+
cd .opencloud/idm
174+
```
175+
176+
Delete the old certificates
177+
178+
```bash
179+
rm ldap.crt ldap.key
180+
181+
Directory structure:
182+
183+
.opencloud/idm
184+
├── idm.boltdb
185+
├── ldap.crt
186+
└── ldap.key
187+
```
188+
189+
Restart the OpenCloud container
190+
191+
```bash
192+
docker compose restart
193+
```
194+
195+
➡️ The certificates will be automatically regenerated on restart.
196+
197+
#### ⚠️ Recommendation
198+
199+
Admins should avoid using LibreIDM in production and use OpenLDAP instead.

versioned_docs/version-4.0/admin/resources/common-issues.md

Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -144,3 +144,58 @@ sudo docker run -it --rm -v opencloud-compose_opencloud-data:/var/lib/opencloud
144144
```bash
145145
docker compose up -d
146146
```
147+
148+
## Internal LibreIDM cert expires
149+
150+
### 🔧 Renewing an expired certificate in internal IDM (OpenCloud)
151+
152+
When using the internal IDM (LibreIDM), the LDAP certificate may expire over time.
153+
You can see similar errormessages in your logfiles:
154+
155+
```bash
156+
Errormassage:
157+
158+
opencloud-1 | 2026-03-10T14:10:36Z WRN core access token not set host.name=3133c92656c8 pkg=rhttp service=frontend traceid=2da2886cf47f0143876953ee33f814a9
159+
opencloud-1 | 2026-03-10T14:10:36Z ERR failed to build subject.session error="invalid key format" service=proxy
160+
opencloud-1 | 2026-03-10T14:10:36Z ERR handleConnection ber.ReadPacket error="remote error: tls: bad certificate" service=idm
161+
opencloud-1 | 2026-03-10T14:10:37Z ERR could not get ldap Connection error="LDAP Result Code 200 \"Network Error\": tls: failed to verify certificate: x509: certificate has expired or is not yet valid: current time 2026-03-10T14:10:37Z is after 2026-03-04T10:02:39Z" service=graph
162+
opencloud-1 | 2026-03-10T14:10:37Z ERR failed to add user error="LDAP Result Code 200 \"Network Error\": tls: failed to verify certificate: x509: certificate has expired or is not yet valid: current time 2026-03-10T14:10:37Z is after 2026-03-04T10:02:39Z" request-id=3133c92656c8/LlC0SVlYb4-000023 service=graph
163+
opencloud-1 | 2026-03-10T14:10:37Z ERR handleConnection ber.ReadPacket error="remote error: tls: bad certificate" service=idm
164+
opencloud-1 | 2026-03-10T14:10:37Z ERR could not create user: backend error error="generalException: failed to add user" request-id=3133c92656c8/LlC0SVlYb4-000023 service=graph
165+
opencloud-1 | 2026-03-10T14:10:37Z WRN Error Response OData Error="failed to add user" service=proxy
166+
opencloud-1 | 2026-03-10T14:10:37Z ERR Error creating user error="500 Internal Server Error" service=proxy
167+
opencloud-1 | 2026-03-10T14:10:37Z ERR Autoprovisioning user failed error="500 Internal Server Error" service=proxy
168+
```
169+
170+
#### 🛠️ Solution
171+
172+
Navigate to the IDM directory
173+
174+
```bash
175+
cd .opencloud/idm
176+
```
177+
178+
Delete the old certificates
179+
180+
```bash
181+
rm ldap.crt ldap.key
182+
183+
Directory structure:
184+
185+
.opencloud/idm
186+
├── idm.boltdb
187+
├── ldap.crt
188+
└── ldap.key
189+
```
190+
191+
Restart the OpenCloud container
192+
193+
```bash
194+
docker compose restart
195+
```
196+
197+
➡️ The certificates will be automatically regenerated on restart.
198+
199+
#### ⚠️ Recommendation
200+
201+
Admins should avoid using LibreIDM in production and use OpenLDAP instead.

0 commit comments

Comments
 (0)