Using LDAPs to authenicate
Posted: Tue May 31, 2016 3:08 pm
I am attempting to setup LDAPs with SSL for when user login to via the web interface, but it is not working. I've followed the "Using SSL with XI Active Directory Component", but still having a problem. I have confirmed port 636 has been opened in the firewall. The Nagios server is Linux attempting to use LDAP with SSL to authenticate against Windows AD servers.
The Cert Issuer: Trustwave Holdings, Inc.
Authentication Server Settings:
Connection Method: LDAP
LDAP Port: 636
Security: SSL
The Cert Issuer: Trustwave Holdings, Inc.
Authentication Server Settings:
Connection Method: LDAP
LDAP Port: 636
Security: SSL
[root@<Nagios Server> openldap]# telnet <LDAP Server> 636
Trying xxx.xxx.xxx.xxx
Connected to <LDAP Server>.
Escape character is '^]'.
^]
telnet> q
Connection closed.
[root@<Nagios Server> openldap]# tail /var/log/httpd/error_log
[Tue May 31 15:54:28.454841 2016] [mpm_prefork:notice] [pid 111994] AH00163: Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips configured -- resuming normal operations
[Tue May 31 15:54:28.454870 2016] [core:notice] [pid 111994] AH00094: Command line: '/usr/sbin/httpd -D FOREGROUND'
[Tue May 31 15:57:52.707875 2016] [mpm_prefork:notice] [pid 111994] AH00170: caught SIGWINCH, shutting down gracefully
[Tue May 31 15:57:53.823667 2016] [suexec:notice] [pid 120714] AH01232: suEXEC mechanism enabled (wrapper: /usr/sbin/suexec)
[Tue May 31 15:57:53.825323 2016] [ssl:warn] [pid 120714] AH02292: Init: Name-based SSL virtual hosts only work for clients with TLS server name indication support (RFC 4366)
[Tue May 31 15:57:53.864869 2016] [auth_digest:notice] [pid 120714] AH01757: generating secret for digest authentication ...
[Tue May 31 15:57:53.865850 2016] [lbmethod_heartbeat:notice] [pid 120714] AH02282: No slotmem from mod_heartmonitor
[Tue May 31 15:57:53.867344 2016] [ssl:warn] [pid 120714] AH02292: Init: Name-based SSL virtual hosts only work for clients with TLS server name indication support (RFC 4366)
[Tue May 31 15:57:53.931136 2016] [mpm_prefork:notice] [pid 120714] AH00163: Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips configured -- resuming normal operations
[Tue May 31 15:57:53.931167 2016] [core:notice] [pid 120714] AH00094: Command line: '/usr/sbin/httpd -D FOREGROUND'
URL:https://assets.nagios.com/downloads/nag ... ponent.pdf[root@<Nagios Server> openldap]# cat ldap.conf
#
# LDAP Defaults
#
# See ldap.conf(5) for details
# This file should be world readable but not world writable.
#BASE dc=example,dc=com
#URI ldap://ldap.example.com ldap://ldap-master.example.com:666
#SIZELIMIT 12
#TIMELIMIT 15
#DEREF never
#TLS_CACERTDIR /etc/openldap/cacerts
# Turning this off breaks GSSAPI used with krb5 when rdns = false
SASL_NOCANON on
#URI ldap://<LDAP Servers 2>/ ldap://<LDAP Server 3>/
URI ldaps://<LDAP Server 1>/
BASE dc=<domain>,dc=<domain>
#TLS_CACERTDIR /cacerts
TLS_CACERTDIR /etc/openldap/cacerts
TLS_CACERT /etc/openldap/cacerts.pem
#TLS_REQCERT demand
#TLS_REQCERT never