Online Forums
Technical support is provided through Support Forums below. Anybody can view them; you need to Register/Login to our site (see links in upper right corner) in order to Post questions. You do not have to be a licensed user of our product.
Please read Rules for forum posts before reporting your issue or asking a question. OPC Labs team is actively monitoring the forums, and replies as soon as possible. Various technical information can also be found in our Knowledge Base. For your convenience, we have also assembled a Frequently Asked Questions page.
Do not use the Contact page for technical issues.
- Forum
- Discussions
- Feature Requests & Product Improvement Ideas
- opc-ua certificate-based user authentication on linux
opc-ua certificate-based user authentication on linux
Hello,
thank you very much for the provided UA server access. I have added the support for X.509 certificate user authentication into QuickOPC for .NET Core/.NET 5+, and have verified that it works - under Windows. I kindly ask you to verify it under Linux, and let us know.
The support will be officially available in the next QuickOPC version, i.e. QuickOPC 2021.3, with likely release date in November 2021.
It is now, however, already available in the "preview" NuGet package, 5.62.0-rev17. Please use this package for your testing.
Best regards
Please Log in or Create an account to join the conversation.
Best regards
Please Log in or Create an account to join the conversation.
Please Log in or Create an account to join the conversation.
thank you for your continuing interest in our products.
I have checked into the issue. The X.509 certificate token is not currently supported under .NET Core/.NET 5+ (so, this applies to Linux - but also to Windows if the project is targeting the .NET Core runtime and not .NET Framework).
But, the reason for this appears to be obsoleted. I have reviewed the code and it looks that it should not be difficult to support the X.509 certificate token under .NET Core/.NET 5+.
Unfortunately, we currently do not have a server to test this particular feature against. Would it be possible that you either provide us with the server (if it is PC-based), or privately expose its endpoint to us, for testing this out?
Best regards
Please Log in or Create an account to join the conversation.
Application domain unhandled exception details:
OpcLabs.EasyOpc.UA.OperationModel.UAException: An OPC-UA operation failure with error ID 'OpcLabs.UAEngine=1' occurred, originating from 'OpcLabs.EasyOpcUA' and with depth of 2. The inner exception, of type "OpcLabs.EasyOpc.UA.Engine.UAEngineException", contains details about the problem.
---> OpcLabs.EasyOpc.UA.Engine.UAEngineException: UA SDK error (System.NotSupportedException) in 'static Session.Create'. Token info of type "OpcLabs.BaseLib.IdentityModel.User.X509CertificateTokenInfo" is not supported when creating a new OPC UA user identity for the client.
+ The client method called (or event/callback invoked) was 'ReadMultiple'.
---> System.NotSupportedException: Token info of type "OpcLabs.BaseLib.IdentityModel.User.X509CertificateTokenInfo" is not supported when creating a new OPC UA user identity for the client.
at OpcLabs.EasyOpc.UA.Sdk.Utilities.UserIdentityUtilities.CreateFromTokenInfo(TokenInfo tokenInfo)
at OpcLabs.EasyOpc.UA.Toolkit.ClientServer.UAClientSessionBase.CreateSdkUserIdentity(UserIdentity userIdentity, TokenInfoPolicy tokenInfoPolicy, TokenSelectionPolicy tokenSelectionPolicy)
at OpcLabs.EasyOpc.UA.Toolkit.ClientServer.UAClientSessionBase.SelectSdkUserIdentity(EndpointDescription sdkEndpointDescription)
at OpcLabs.EasyOpc.UA.Toolkit.ClientServer.UAClientSessionBase.CreateSdkUserIdentity(EndpointDescription sdkEndpointDescription)
at OpcLabs.EasyOpc.UA.Sdk.Shims.SessionShim.Create(ApplicationConfiguration configuration, ConfiguredEndpoint endpoint, Boolean updateBeforeConnect, Boolean checkDomain, String sessionName, UInt32 millisecondsSessionTimeout, Func`2 identityFunction, IList`1 preferredLocales, Action`2 domainCheckError, Action`1 setupSession, Action`1 setupTransportChannel)
at OpcLabs.EasyOpc.UA.Toolkit.Sdk.ToolkitSession.Create(ApplicationConfiguration configuration, ConfiguredEndpoint endpoint, Boolean updateBeforeConnect, Boolean checkDomain, String sessionName, UInt32 millisecondsSessionTimeout, Func`2 identityFunction, IList`1 preferredLocales, Action`2 domainCheckError, Action`1 setupTransportChannel, UAClientSessionBase clientSession)
--- End of inner exception stack trace ---
== Activity Trace ==
Following (3) events were gathered during the action on activity ID [12], in the order of first occurrence:
[4] SDK trace: Channel 357 in Closed state.
[4] SDK trace: CLIENTCHANNEL SOCKET CLOSED: 0166EE84, ChannelId=357
Exception: {System.AggregateException} One or more errors occurred.
Events starting with activity ID in [] may not necessarily be related to the current action.
--- End of inner exception stack trace ---
at OpcLabs.EasyOpc.UA.OperationModel.UAException.CheckSuccess(Exception exception)
at OpcLabs.EasyOpc.UA.OperationModel.UAException.CheckSuccess(OperationResult operationResult)
at OpcLabs.EasyOpc.UA.IEasyUAClientExtension.Read(IEasyUAClient client, UAReadArguments readArguments)
at OpcLabs.EasyOpc.UA.IEasyUAClientExtension.Read(IEasyUAClient client, UAEndpointDescriptor endpointDescriptor, UANodeDescriptor nodeDescriptor)
at qopc3.Program.Main(String[] args) in /home/dgu/RiderProjects/qopc3/qopc3/Program.cs:line 39
Please Log in or Create an account to join the conversation.
- Forum
- Discussions
- Feature Requests & Product Improvement Ideas
- opc-ua certificate-based user authentication on linux