Skip to content
This repository has been archived by the owner on Nov 9, 2024. It is now read-only.

Thumbprint taken from incorrect certificate in the chain #1

Open
nweisenauer-sap opened this issue Mar 25, 2024 · 0 comments
Open

Thumbprint taken from incorrect certificate in the chain #1

nweisenauer-sap opened this issue Mar 25, 2024 · 0 comments

Comments

@nweisenauer-sap
Copy link

Hey,

excited to try out your tool to automatically refresh the thumbprints inside our AWS Identity Providers, I found that it actually does not extract the correct thumbprint (or at least not the one AWS wants us to put there).

As per https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc_verify-thumbprint.html
the thumbprint of the top intermediate CA should be used.

IAM requires the thumbprint for the top intermediate certificate authority (CA) that signed the certificate used by the external identity provider (IdP)

I observed that aws-oidc-provider-refresher uses not the thumbprint of the top intermediate CA in the chain, but the thumbprint of the bottom certificate in the chain. It can easily be confirmed by setting up a fresh IDP in AWS, which comes with the feature to automatically set the correct thumbprint by AWS. Running aws-oidc-provider-refresher --verbose immediately afterwards already reports that an update to the thumbprint is needed, as the tool wants to put the thumbprint of another certificate in the chain.

Cheers,
Nico

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant