

Configuring the Broker and Server › Broker and Server Communication › Start the Server (UNIX, Linux, and zLinux) › Options for LDAP Attribute Names › Novell eDirectory
Novell eDirectory
For Novell eDirectory, you may need to create the trusted certificate file and to create the client certificate and private key files. Creating the trusted certificate file enhances security for authenticating and protecting users' logon credentials. Sample procedures for performing these tasks follow.
Follow these steps:
- Start the ConsoleOne client for your Novell eDirectory server.
- On the ConsoleOne console, right‑click the IP AG object and select Properties from the shortcut menu.
The Properties dialog appears.
- Click the Certificates, Trusted Root Certificate configuration tab.
- Click Export to export this certificate, but do not include the private key with the export.
- Click DER format to export the key file.
- Leave the Properties dialog open and start a command prompt.
- Use the OpenSSL utility to convert the certificate from DER format to PEM format, because OpenLDAP requires PEM format. Use the following command as a model:
openssl x509 -in cacertfile.der -inform DER -outform PEM -out cacertfile.pem
where cacertfile.der is the file generated by ConsoleOne.
The resulting file, cacertfile.pem, is used for the CA Harvest SCM remote agent TLS configuration.
- Leave open the Properties dialog and the command prompt and complete the following steps to create the client certificate and private key files. When you create the client certificate and private key files, you enhance security for authenticating and protecting users' logon credentials.
Important! Before performing these steps, verify that you have completed the previous steps to create the trusted certificate file.
Follow these steps:
- On ConsoleOne, select the user object (for example, CA Harvest SCM Admin) and open the Properties dialog.
- On the Properties dialog, click the Security tab and select Certificates:
- Export this certificate and specify that the private key be included with the export.
- In the fields provided, enter and confirm the password for encrypting the private key.
- Record the password because you need it in a next step to separate the certificate from the private key.
The client certificate is exported.
Use the OpenSSL utility to separate the certificate from the private key and remove the password.
- Enter the following command to extract the certificate and remove the password:
openssl pkcs12 ‑in certfile.pfx ‑clcerts ‑nodes ‑nokeys ‑out certfile.pem
- When prompted, enter the password used when exporting the pfx certificate created by ConsoleOne. In this example, the exported certificate file is certfile.pfx.
- Enter the following command to extract the private key and remove the password:
openssl pkcs12 ‑in certfile.pfx ‑clcerts ‑out temp.pem ‑nodes
- When prompted, enter the password used to export the pfx certificate:
openssl rsa ‑in temp.pem ‑out key.pem
The certfile.pem and key.pem files are used for the TLS configuration. The temp.pem file is an intermediate file and can be deleted.
Copyright © 2014 CA Technologies.
All rights reserved.
 
|
|