Monitor LDAP Binding with LDAPS and Channel Binding enabled
Posted: Thu Feb 11, 2021 5:08 pm
Hello Nagios team,
Our domain administrators would like to make the move to Secure LDAP with Channel Binding. Unfortunately, our early testing with the 'LDAP Bind' service checks we already have configured has been unsuccessful and I require your expertise.
After reading numerous support articles, I've come to the conclusion that in order for these checks to keep working we need to somehow incorporate a certificate for each one of our domain controllers into the XI system. I'm not exactly sure how to accomplish that.
Here's what I've been reading:
https://www.altaro.com/vmware/understan ... g-signing/
https://support.microsoft.com/en-us/top ... 99a66fc00a
https://zend.to/troubleshoot-ad.pdf
Here's what our existing LDAP Bind checks look like: $USER1$/check_ldap -H $HOSTADDRESS$ -b "$ARG1$" -D "$ARG2$" -P "$ARG3$" -2 -p 3268
I'm told LDAPS uses port 636. I tried just switching to that and it does not bind. I also tried combinations of using the -S (--ssl) switch and changing the version from -2 to -3.
Our domain administrators would like to make the move to Secure LDAP with Channel Binding. Unfortunately, our early testing with the 'LDAP Bind' service checks we already have configured has been unsuccessful and I require your expertise.
After reading numerous support articles, I've come to the conclusion that in order for these checks to keep working we need to somehow incorporate a certificate for each one of our domain controllers into the XI system. I'm not exactly sure how to accomplish that.
Here's what I've been reading:
https://www.altaro.com/vmware/understan ... g-signing/
https://support.microsoft.com/en-us/top ... 99a66fc00a
https://zend.to/troubleshoot-ad.pdf
Here's what our existing LDAP Bind checks look like: $USER1$/check_ldap -H $HOSTADDRESS$ -b "$ARG1$" -D "$ARG2$" -P "$ARG3$" -2 -p 3268
I'm told LDAPS uses port 636. I tried just switching to that and it does not bind. I also tried combinations of using the -S (--ssl) switch and changing the version from -2 to -3.