Connecting to an LDAP user directory over SSL requires that you configure the system to use the certificate database files.
Follow the instructions in the subsequent sections to configure the connection over SSL.
Note: CA Directory does not support this method of configuring SSL.
Review the following points before configuring an LDAP user directory connection over SSL:
Important! Do not use Microsoft Internet Explorer to install certificates into your cert8.db database file.
On the computer hosting the Active Directory instance, verify that the root CA certificate and the server certificate are added to the service certificate store.
To create the certificate database files, use the Mozilla Network Security Services (NSS) certutil application that is included with the Policy Server
Note: The following procedure details the specific options and arguments to complete the task. For a complete list of the NSS utility options and arguments, refer to the Mozilla documentation on the NSS project page.
Important! Before running a CA SiteMinder® utility or executable on Windows Server 2008, open the command-line window with administrator permissions. Open the command-line window this way, even if your account has administrator privileges.
Follow these steps:
Example: C:\Program Files\CA\SiteMinder\bin
Note: Windows has a native certutil utility. Verify that you are working from the Policy Server bin directory, or you can inadvertently run the Windows certutil utility.
certutil -N -d certificate_database_directory
Creates the cert8.db, key3.db, and secmod.db certificate database files.
Specifies the directory in which the certutil tool is to create the certificate database files.
Note: If the file path contains spaces, bracket the path in quotes.
The utility prompts for a password to encrypt the database key.
NSS creates the required certificate database files:
Example: Create the Certificate Database Files
certutil -N -d C:\certdatabase
To add the root Certificate Authority (CA), use the Mozilla Network Security Services (NSS) certutil application, which is in the Policy Server.
Note: The following procedure details the specific options and arguments to complete the task. For a complete list of the NSS utility options and arguments, refer to the Mozilla documentation on the NSS project page.
Important! Before running a CA SiteMinder® utility or executable on Windows Server 2008, open the command-line window with administrator permissions. Open the command-line window this way, even if your account has administrator privileges.
Follow these steps:
Example: C:\Program Files\CA\SiteMinder\bin
Note: Windows has a native certutil utility. Verify that you are working from the bin directory of the NSS utility, or you can inadvertently run the Windows certutil utility.
certutil -A -n alias -t trust_arguments -i root_CA_path -d certificate_database_directory
Adds a certificate to the certificate database.
Specifies an alias for the certificate.
Note: If the alias contains spaces, bracket the alias with quotes.
Specifies the trust attributes to apply to the certificate. The three available trust categories are expressed in this order: "SSL, email, object signing". In each category position, you can use zero or more of the following attribute arguments.
p
Valid peer.
P
Trusted peer. This argument implies p.
c
Valid CA.
T
Trusted CA to issue client certificates. This argument implies c.
C
Trusted CA to issue server certificates (SSL only). This argument implies c.
Important! This argument is required for the SSL trust category.
u
Certificate can be used for authentication or signing.
Specifies the path to the root CA file. The path includes the certificate name. The valid extensions for a certificate include cert, .cer, and .pem.
Note: If the file path contains spaces, bracket the path in quotes.
Specifies the path to the directory that contains the certificate database.
Note: If the file path contains spaces, bracket the path in quotes.
Example: Adding a Root CA to the Certificate Database
certutil -A -n "My Root CA" -t "C,," -i C:\certificates\cacert.cer -d C:\certdatabase
To enable communication over SSL, add the server certificate to the certificate. Use the Mozilla Network Security Services (NSS) certutil application, which is available with the Policy Server.
Note: The following procedure details the specific options and arguments to complete the task. For a complete list of the NSS utility options and arguments, refer to the Mozilla documentation on the NSS project page.
Important! Before running a CA SiteMinder® utility or executable on Windows Server 2008, open the command-line window with administrator permissions. Open the command-line window this way, even if your account has administrator privileges.
Follow these steps:
Example: C:\Program Files\CA\SiteMinder\bin
Note: Windows has a native certutil utility. Verify that you are working from the bin directory of the NSS utility, or you can inadvertently run the Windows certutil utility.
certutil -A -n alias -t trust_arguments -i server_certificate_path -d certificate_database_directory
Adds a certificate to the certificate database.
Specifies an alias for the certificate.
Note: If the alias contains spaces, bracket the alias with quotes.
Specifies the trust argument. The three available trust categories for each certificate are expressed in this order: "SSL, email, object signing". In each category position, you can use zero or more of the following attribute arguments:
p
Valid peer.
P
Trusted peer. This argument implies p.
Important! This argument is required for the SSL trust category.
Specifies the path to the server certificate. The path includes the certificate name. The valid extensions for a certificate include.cert, .cer, and .pem.
Note: If the file path contains spaces, bracket the path in quotes.
Specifies the path to the directory that contains the certificate database.
Note: If the file path contains spaces, bracket the path in quotes.
NSS adds the server certificate to the certificate database.
Example: Adding a Server Certificate to the Certificate Database
certutil -A -n "My Server Certificate" -t "P,," -i C:\certificates\servercert.cer -d C:\certdatabase
To verify that the certificates are in the certificate database, use the Mozilla Network Security Services (NSS) certutil application. Policy Server includes this tool.
Note: The following procedure details the specific options and arguments to complete the task. For a complete list of the NSS utility options and arguments, refer to the Mozilla documentation on the NSS project page.
Important! Before running a CA SiteMinder® utility or executable on Windows Server 2008, open the command-line window with administrator permissions. Open the command-line window this way, even if your account has administrator privileges.
Follow these steps:
Example: C:\Program Files\CA\SiteMinder\bin
Note: Windows has a native certutil utility. Verify that you are working from the bin directory of the NSS utility, or you can inadvertently run the Windows certutil utility.
certutil -L -d certificate_database_directory
Lists all of the certificates in the certificate database.
Specifies the path to the directory that contains the certificate database.
Note: If the file path contains spaces, bracket the path in quotes.
This command displays the root CA alias, the server certificate alias, and the trust attributes you specified when adding the certificates to the certificate database.
Example: List the Certificates in the Certificate Database
certutil -L -d C:\certdatabase
After pointing the system to the correct certificate database, enable the SSL-secured connection to the LDAP user directory. SSL further secures the communication between the Policy Server and the user directory.
Note: The following procedure assumes that you have an LDAP connection working properly.
Follow these steps:
The User Directory List is displayed.
You return to the User Directory dialog.
A message at the top of the dialog either confirms that the SSL is properly configured reports and error.
The user directory connection is configured to communicate over SSL.
Connecting to an LDAP user directory over SSL requires that the system point to the proper certificate database. This database must contain the cert8.db and key3.db files.
The XPSConfig tool, which is shipped with the product, enables you to specify the path to the certificate database using the LdapObjCertDbPath setting.
Follow these steps:
Example:
C:\Program Files\CA\Federation Standalone\ldaps\certdb
The new value is saved.
The correct certificate database is now in use.
Verify the SSL connection and so you are sure that the user directory connection is secured.
Follow these steps:
The User Directories screen appears. The table lists the names of existing user directory connections.
The directory settings display.
If SSL is properly configured, the Directory Contents screen appears and lists the contents of the user directory.
The list following specifies actions you can take when you encounter problems connecting to the LDAP user directory using SSL:
|
Copyright © 2014 CA.
All rights reserved.
|
|