When I request certificate from Letsencrypt, put key and fullchain.cer in nginx config - everything works fine.
The same for Active Directory is not working.
-I generate key (tried rsa 2048 or 4096 bits, ec with default curve and settings)
-Then generate CSR
-Upload CSR to local PKI site
-Get PEM certificates (certnew.cer - certificate , certnew.p7b - fullchain)
-Convert from PKCS #7 to PEM
openssl pkcs7 -print_certs -in certnew.p7b -out 3cer
the contents look like valid fullchain. But nginx is not starting
SSL_CTX_set0_chain("/etc/nginx/ssl.pem") failed (SSL: error:1415418D:SSL routines:ssl_cert_set0_chain:ca key too small)
Some funny fact - if I put single certificate certnew.cer as nginx server.ssl_certificate everything seems to work (although it is not fullchain and AFAIK this shouldn't work)
I'm not AD admin. I can only change CSR parameters or add "attributes" in AD PKI textbox (but I didn't find any documentation what's this for).
Can I force AD to use larger key? Or maybe this nginx error message is misleading?