i am trying to login with standard password to dc-p2 via web service but it reports The authentication has failed, check error log
The user is trying to log into dc-p2 via a web service but authentication is failing. I need to check the error logs on dc-p2 to see what's happening. This could be related to the Univention Management Console (UMC) or Apache web service.
ssh root@dc-p2.sa.out.ba "journalctl -u univention-management-console-server -n 50 --no-pager 2>&1 | tail -50"
ssh root@dc-p2.sa.out.ba "tail -100 /var/log/univention/management-console-server.log 2>&1 | grep -iE 'error|fail|auth|login' | tail -30"
Dec 27 09:18:25 dc-p2 unix_chkpwd[2856049]: could not obtain user info (Administrator) Dec 28 00:00:02 dc-p2 systemd[1]: univention-management-console-server.service: Sent signal SIGHUP to main process 1445 (/usr/bin/python) on client request. Jan 04 00:00:03 dc-p2 systemd[1]: univention-management-console-server.service: Sent signal SIGHUP to main process 1445 (/usr/bin/python) on client request. Jan 11 00:00:03 dc-p2 systemd[1]: univention-management-console-server.service: Sent signal SIGHUP to main process 1445 (/usr/bin/python) on client request. Jan 18 00:00:02 dc-p2 systemd[1]: univention-management-console-server.service: Sent signal SIGHUP to main process 1445 (/usr/bin/python) on client request. Jan 21 08:55:17 dc-p2 unix_chkpwd[429304]: check pass; user unknown Jan 21 08:55:17 dc-p2 unix_chkpwd[429304]: password check failed for user (Administrator) Jan 21 08:55:17 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_unix(univention-management-console:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=Administrator Jan 21 08:55:17 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_krb5(univention-management-console:auth): authentication failure; logname=Administrator uid=0 euid=0 tty= ruser= rhost= Jan 21 08:55:17 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_sss(univention-management-console:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=Administrator Jan 21 08:55:17 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_sss(univention-management-console:auth): received for user Administrator: 9 (Authentication service cannot retrieve authentication info) Jan 21 08:55:29 dc-p2 unix_chkpwd[429353]: check pass; user unknown Jan 21 08:55:29 dc-p2 unix_chkpwd[429353]: password check failed for user (Administrator) Jan 21 08:55:29 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_unix(univention-management-console:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=Administrator Jan 21 08:55:29 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_krb5(univention-management-console:auth): authentication failure; logname=Administrator uid=0 euid=0 tty= ruser= rhost= Jan 21 08:55:29 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_sss(univention-management-console:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=Administrator Jan 21 08:55:29 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_sss(univention-management-console:auth): received for user Administrator: 9 (Authentication service cannot retrieve authentication info) Jan 21 08:55:54 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_unix(univention-management-console:auth): check pass; user unknown Jan 21 08:55:54 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_unix(univention-management-console:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= Jan 21 08:55:54 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_krb5(univention-management-console:auth): authentication failure; logname=admin uid=0 euid=0 tty= ruser= rhost= Jan 21 08:55:54 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_sss(univention-management-console:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=admin Jan 21 08:55:54 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_sss(univention-management-console:auth): received for user admin: 10 (User not known to the underlying authentication module) Jan 21 08:56:35 dc-p2 unix_chkpwd[429411]: check pass; user unknown Jan 21 08:56:35 dc-p2 unix_chkpwd[429411]: password check failed for user (Administrator) Jan 21 08:56:35 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_unix(univention-management-console:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=Administrator Jan 21 08:56:35 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_krb5(univention-management-console:auth): authentication failure; logname=Administrator uid=0 euid=0 tty= ruser= rhost= Jan 21 08:56:35 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_sss(univention-management-console:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=Administrator Jan 21 08:56:35 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_sss(univention-management-console:auth): received for user Administrator: 9 (Authentication service cannot retrieve authentication info) Jan 21 08:57:31 dc-p2 unix_chkpwd[429461]: check pass; user unknown Jan 21 08:57:31 dc-p2 unix_chkpwd[429461]: password check failed for user (Administrator) Jan 21 08:57:31 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_unix(univention-management-console:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=Administrator Jan 21 08:57:31 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_krb5(univention-management-console:auth): authentication failure; logname=Administrator uid=0 euid=0 tty= ruser= rhost= Jan 21 08:57:31 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_sss(univention-management-console:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=Administrator Jan 21 08:57:31 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_sss(univention-management-console:auth): received for user Administrator: 9 (Authentication service cannot retrieve authentication info) Jan 21 08:57:46 dc-p2 unix_chkpwd[429470]: check pass; user unknown Jan 21 08:57:46 dc-p2 unix_chkpwd[429470]: password check failed for user (Administrator) Jan 21 08:57:46 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_unix(univention-management-console:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=Administrator Jan 21 08:57:46 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_krb5(univention-management-console:auth): authentication failure; logname=Administrator uid=0 euid=0 tty= ruser= rhost= Jan 21 08:57:46 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_sss(univention-management-console:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=Administrator Jan 21 08:57:46 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_sss(univention-management-console:auth): received for user Administrator: 9 (Authentication service cannot retrieve authentication info) Jan 21 09:15:40 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_unix(univention-management-console:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=Administrator Jan 21 09:15:40 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_krb5(univention-management-console:auth): authentication failure; logname=Administrator uid=0 euid=0 tty= ruser= rhost= Jan 21 09:15:40 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_sss(univention-management-console:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=Administrator Jan 21 09:15:40 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_sss(univention-management-console:auth): received for user Administrator: 9 (Authentication service cannot retrieve authentication info) Jan 21 09:16:05 dc-p2 unix_chkpwd[431815]: check pass; user unknown Jan 21 09:16:05 dc-p2 unix_chkpwd[431815]: password check failed for user (Administrator) Jan 21 09:16:05 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_unix(univention-management-console:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=Administrator Jan 21 09:16:05 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_krb5(univention-management-console:auth): authentication failure; logname=Administrator uid=0 euid=0 tty= ruser= rhost= Jan 21 09:16:05 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_sss(univention-management-console:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=Administrator Jan 21 09:16:05 dc-p2 /usr/bin/python[1445]: python3 /usr/sbin/univention-management-console-server: pam_sss(univention-management-console:auth): received for user Administrator: 9 (Authentication service cannot retrieve authentication info)
21.01.26 08:55:17.188 AUTH ( WARN ) : Canonicalization of username was not possible: LDAP Error: Connect error: error:0A000086:SSL routines::certificate verify failed (certificate has expired).
21.01.26 08:55:19.176 AUTH ( ERROR ) : PAM: authentication error: ('Authentication failure', 7)
21.01.26 08:55:19.182 AUTH ( ERROR ) : The authentication has failed, please login again.
21.01.26 08:55:29.741 AUTH ( WARN ) : Canonicalization of username was not possible: {'result': -11, 'desc': 'Connect error', 'ctrls': [], 'info': 'error:0A000086:SSL routines::certificate verify failed (certificate has expired)'}
21.01.26 08:55:31.992 AUTH ( ERROR ) : PAM: authentication error: ('Authentication failure', 7)
21.01.26 08:55:31.992 AUTH ( ERROR ) : The authentication has failed, please login again.
21.01.26 08:55:54.028 AUTH ( WARN ) : Canonicalization of username was not possible: {'result': -11, 'desc': 'Connect error', 'ctrls': [], 'info': 'error:0A000086:SSL routines::certificate verify failed (certificate has expired)'}
21.01.26 08:55:56.332 AUTH ( ERROR ) : PAM: authentication error: ('Authentication failure', 7)
21.01.26 08:55:56.332 AUTH ( ERROR ) : The authentication has failed, please login again.
21.01.26 08:56:35.434 AUTH ( WARN ) : Canonicalization of username was not possible: {'result': -11, 'desc': 'Connect error', 'ctrls': [], 'info': 'error:0A000086:SSL routines::certificate verify failed (certificate has expired)'}
21.01.26 08:56:37.768 AUTH ( ERROR ) : PAM: authentication error: ('Authentication failure', 7)
21.01.26 08:56:37.769 AUTH ( ERROR ) : The authentication has failed, please login again.
21.01.26 08:57:31.799 AUTH ( WARN ) : Canonicalization of username was not possible: {'result': -11, 'desc': 'Connect error', 'ctrls': [], 'info': 'error:0A000086:SSL routines::certificate verify failed (certificate has expired)'}
21.01.26 08:57:33.473 AUTH ( ERROR ) : PAM: authentication error: ('Authentication failure', 7)
21.01.26 08:57:33.474 AUTH ( ERROR ) : The authentication has failed, please login again.
21.01.26 08:57:46.630 AUTH ( WARN ) : Canonicalization of username was not possible: {'result': -11, 'desc': 'Connect error', 'ctrls': [], 'info': 'error:0A000086:SSL routines::certificate verify failed (certificate has expired)'}
21.01.26 08:57:49.032 AUTH ( ERROR ) : PAM: authentication error: ('Authentication failure', 7)
21.01.26 08:57:49.033 AUTH ( ERROR ) : The authentication has failed, please login again.
21.01.26 09:15:39.959 AUTH ( WARN ) : Canonicalization of username was not possible: {'result': -11, 'desc': 'Connect error', 'ctrls': [], 'info': 'error:0A000086:SSL routines::certificate verify failed (self-signed certificate in certificate chain)'}
21.01.26 09:15:41.990 AUTH ( ERROR ) : PAM: authentication error: ('Authentication failure', 7)
21.01.26 09:15:41.991 AUTH ( ERROR ) : The authentication has failed, please login again.
21.01.26 09:16:05.107 AUTH ( WARN ) : Canonicalization of username was not possible: {'result': -11, 'desc': 'Connect error', 'ctrls': [], 'info': 'error:0A000086:SSL routines::certificate verify failed (self-signed certificate in certificate chain)'}
21.01.26 09:16:06.704 AUTH ( ERROR ) : PAM: authentication error: ('Authentication failure', 7)
21.01.26 09:16:06.705 AUTH ( ERROR ) : The authentication has failed, please login again.The UMC server is having issues with LDAP TLS certificate verification. The error shows "self-signed certificate in certificate chain" which is the same issue we saw before. The UMC server needs to be restarted to pick up the new certificates, and possibly sssd service as well since pam_sss is also failing.
Let me restart the relevant services.
The UMC server still has cached certificate issues. The error is "self-signed certificate in certificate chain" - same as before. Let me restart the relevant services.
ssh root@dc-p2.sa.out.ba "systemctl restart sssd univention-management-console-server && sleep 2 && systemctl status sssd univention-management-console-server --no-pager"
● sssd.service - System Security Services Daemon
Loaded: loaded (/lib/systemd/system/sssd.service; enabled; preset: enabled)
Active: active (running) since Wed 2026-01-21 09:17:18 CET; 4s ago
Main PID: 431859 (sssd)
Tasks: 5 (limit: 3556)
Memory: 60.8M
CPU: 432ms
CGroup: /system.slice/sssd.service
├─431859 /usr/sbin/sssd -i --logger=files
├─431860 /usr/libexec/sssd/sssd_be --domain sa.out.ba --uid 0 --gid 0 --logger=files
├─431861 /usr/libexec/sssd/sssd_be --domain nonposixldap --uid 0 --gid 0 --logger=files
├─431862 /usr/libexec/sssd/sssd_nss --uid 0 --gid 0 --logger=files
└─431863 /usr/libexec/sssd/sssd_pam --uid 0 --gid 0 --logger=files
Jan 21 09:17:18 dc-p2 systemd[1]: Starting sssd.service - System Security Services Daemon...
Jan 21 09:17:18 dc-p2 sssd[431859]: Starting up
Jan 21 09:17:18 dc-p2 sssd_be[431860]: Starting up
Jan 21 09:17:18 dc-p2 sssd_be[431861]: Starting up
Jan 21 09:17:18 dc-p2 sssd_nss[431862]: Starting up
Jan 21 09:17:18 dc-p2 sssd_pam[431863]: Starting up
Jan 21 09:17:18 dc-p2 systemd[1]: Started sssd.service - System Security Services Daemon.
● univention-management-console-server.service - Univention Management Console Server
Loaded: loaded (/lib/systemd/system/univention-management-console-server.service; enabled; preset: enabled)
Drop-In: /usr/lib/systemd/system/univention-management-console-server.service.d
└─dependencies.conf
Active: active (running) since Wed 2026-01-21 09:17:20 CET; 2s ago
Main PID: 431856 (/usr/bin/python)
Tasks: 1 (limit: 3556)
Memory: 125.5M
CPU: 1.910s
CGroup: /system.slice/univention-management-console-server.service
└─431856 "/usr/bin/python3 /usr/sbin/univention-management-console-server"
Jan 21 09:17:18 dc-p2 systemd[1]: Starting univention-management-console-server.service - Univention Management Console Server...
Jan 21 09:17:20 dc-p2 systemd[1]: Started univention-management-console-server.service - Univention Management Console Server.The services restarted. Let me verify that authentication is working now by checking if there are any new errors in the logs.
Services restarted. Please try logging in again. Let me also check if there are any remaining certificate issues.
ssh root@dc-p2.sa.out.ba "ldapsearch -x -H ldap://localhost:7389 -D 'cn=Administrator,cn=users,dc=sa,dc=out,dc=ba' -W -b 'dc=sa,dc=out,dc=ba' '(cn=Administrator)' cn 2>&1 | head -20" < /dev/null
Enter LDAP Password: ldap_bind: Server is unwilling to perform (53) additional info: unauthenticated bind (DN with no password) disallowed
The test requires interactive password input which won't work here. Let me check if there are any sssd errors related to certificate verification.
ssh root@dc-p2.sa.out.ba "journalctl -u sssd -n 30 --no-pager | grep -iE 'error|fail|cert|tls'"
Jan 21 08:49:17 dc-p2 sssd_be[3303646]: Could not start TLS encryption. error:0A000086:SSL routines::certificate verify failed (certificate has expired) Jan 21 08:49:21 dc-p2 sssd_be[3303646]: Could not start TLS encryption. error:0A000086:SSL routines::certificate verify failed (certificate has expired) Jan 21 08:50:55 dc-p2 sssd_be[3303646]: Could not start TLS encryption. error:0A000086:SSL routines::certificate verify failed (certificate has expired) Jan 21 08:55:17 dc-p2 sssd_be[3303647]: Could not start TLS encryption. error:0A000086:SSL routines::certificate verify failed (certificate has expired) Jan 21 08:55:52 dc-p2 sssd_be[3303646]: Could not start TLS encryption. error:0A000086:SSL routines::certificate verify failed (certificate has expired) Jan 21 08:56:35 dc-p2 sssd_be[3303647]: Could not start TLS encryption. error:0A000086:SSL routines::certificate verify failed (certificate has expired) Jan 21 08:57:31 dc-p2 sssd_be[3303647]: Could not start TLS encryption. error:0A000086:SSL routines::certificate verify failed (certificate has expired) Jan 21 08:57:49 dc-p2 sssd_be[3303647]: Could not start TLS encryption. error:0A000086:SSL routines::certificate verify failed (certificate has expired) Jan 21 08:57:51 dc-p2 sssd_be[3303647]: Could not start TLS encryption. error:0A000086:SSL routines::certificate verify failed (certificate has expired) Jan 21 08:57:55 dc-p2 sssd_be[3303647]: Could not start TLS encryption. error:0A000086:SSL routines::certificate verify failed (certificate has expired) Jan 21 09:00:43 dc-p2 sssd_be[3303646]: Could not start TLS encryption. error:0A000086:SSL routines::certificate verify failed (certificate has expired) Jan 21 09:05:44 dc-p2 sssd_be[3303646]: Could not start TLS encryption. error:0A000086:SSL routines::certificate verify failed (certificate has expired) Jan 21 09:10:21 dc-p2 sssd_be[3303646]: Could not start TLS encryption. error:0A000086:SSL routines::certificate verify failed (self-signed certificate in certificate chain) Jan 21 09:15:37 dc-p2 sssd_be[3303646]: Could not start TLS encryption. error:0A000086:SSL routines::certificate verify failed (self-signed certificate in certificate chain) Jan 21 09:15:40 dc-p2 sssd_be[3303647]: Could not start TLS encryption. error:0A000086:SSL routines::certificate verify failed (self-signed certificate in certificate chain)
The old sssd errors are before the restart. Let me check if there are any new errors after the restart at 09:17:18.
ssh root@dc-p2.sa.out.ba "journalctl -u sssd --since '09:17:00' --no-pager"
Jan 21 09:17:18 dc-p2 systemd[1]: Stopping sssd.service - System Security Services Daemon... Jan 21 09:17:18 dc-p2 sssd_nss[3303648]: Shutting down (status = 0) Jan 21 09:17:18 dc-p2 sssd_be[3303647]: Shutting down (status = 0) Jan 21 09:17:18 dc-p2 sssd_be[3303646]: Shutting down (status = 0) Jan 21 09:17:18 dc-p2 sssd_pam[3303649]: Shutting down (status = 0) Jan 21 09:17:18 dc-p2 systemd[1]: sssd.service: Deactivated successfully. Jan 21 09:17:18 dc-p2 systemd[1]: Stopped sssd.service - System Security Services Daemon. Jan 21 09:17:18 dc-p2 systemd[1]: sssd.service: Consumed 5min 8.080s CPU time. Jan 21 09:17:18 dc-p2 systemd[1]: Starting sssd.service - System Security Services Daemon... Jan 21 09:17:18 dc-p2 sssd[431859]: Starting up Jan 21 09:17:18 dc-p2 sssd_be[431860]: Starting up Jan 21 09:17:18 dc-p2 sssd_be[431861]: Starting up Jan 21 09:17:18 dc-p2 sssd_nss[431862]: Starting up Jan 21 09:17:18 dc-p2 sssd_pam[431863]: Starting up Jan 21 09:17:18 dc-p2 systemd[1]: Started sssd.service - System Security Services Daemon.
Good - sssd restarted cleanly without any TLS errors. Let me check the sssd configuration to see where it gets its CA certificate from.
ssh root@dc-p2.sa.out.ba "grep -iE 'ldap_tls|certificate' /etc/sssd/sssd.conf 2>/dev/null"
certificate_verification = no_ocsp,soft_crl,crl_file=/var/www/ucsCA.crl ldap_tls_cacert = /etc/univention/ssl/ucsCA/CAcert.pem ldap_tls_reqcert = demand ldap_tls_cipher_suite = HIGH:MEDIUM:!aNULL:!MD5:!RC4
SSSD is correctly pointing to the CA certificate. The restart should have picked up the new CA. Let me try a user lookup to see if sssd can now connect to LDAP.
ssh root@dc-p2.sa.out.ba "getent passwd Administrator && echo 'User lookup successful'"
Administrator:x:2002:5000:Administrator:/home/Administrator:/bin/bash User lookup successful
User lookup works. The authentication should work now. Let me check if there are any new errors when trying to authenticate.
User lookup works now. Please try logging in again via the web interface. Let me also check if there are any remaining issues.
ssh root@dc-p2.sa.out.ba "tail -5 /var/log/univention/management-console-server.log"
21.01.26 09:16:05.107 AUTH ( WARN ) : Canonicalization of username was not possible: {'result': -11, 'desc': 'Connect error', 'ctrls': [], 'info': 'error:0A000086:SSL routines::certificate verify failed (self-signed certificate in certificate chain)'}
21.01.26 09:16:06.704 AUTH ( ERROR ) : PAM: authentication error: ('Authentication failure', 7)
21.01.26 09:16:06.705 AUTH ( ERROR ) : The authentication has failed, please login again.
21.01.26 09:17:18.313 MAIN ( WARN ) : Shutting down all open connections
21.01.26 09:17:20.372 DEBUG_INITThe last error was before the restart at 09:17:18. The server restarted cleanly (DEBUG_INIT shows initialization). The user should now be able to log in. Let me wait for them to try or check if they get an error.
Services are now running cleanly. The last errors were before the restart at 09:17:18.
Please try logging in now - the sssd, slapd, and UMC services have all been restarted with the new certificates.
If it still fails, let me know and I'll check the new error messages.
The user confirmed that the login is now working. Let me provide a brief confirmation.
Excellent! All services are now working with the renewed certificates.
Summary of all fixes applied:
| Host | Service | Status |
|---|---|---|
| dc-p2 | CA cert renewed (2031) | ✅ |
| dc-p2 | slapd, sssd, UMC, FreeRADIUS | ✅ |
| dc-s1 | CA + host cert synced | ✅ |
| dc-s1 | slapd, FreeRADIUS | ✅ |
| dc-s2 | CA + host cert synced | ✅ |
| dc-s2 | slapd, FreeRADIUS | ✅ |
All certificates now valid until January 20, 2031.