Hello,
I have downloaded the current eval for VMware Nagiosxi and have it running in an ESX 4.0 environment. I am attempting to configure the authentication to utilize LDAP. we have both eDirectory (primary ldap) and active directory running here. both production systems require SLDAP for bind functions. The nagios interface works fine when I configure AD or eDir to allow binds on port 389. I cannot get it to work for Port 636. I have read through this forum and tried several suggestions with no success.
Current config for eDirectory:
LDAP Host: ldaps://ldap.com
LDAP Port: 636
Base DN: ou=users,o=uc
User DN: cn=[USERNAME],ou=Users,o=uc
This configuration works when I change LDAP Port: 389, and LDAP Host: ldap://ldap.com
We do use an internally signed certificate for our LDAP directories. Other systems I imported our CA to the system keystore or similiar however I find no information on where this keystore is or if it is required.
Regards
Bryan
authenticating with secure LDAP
-
- DevOps Engineer
- Posts: 19396
- Joined: Tue Nov 15, 2011 3:11 pm
- Location: Nagios Enterprises
- Contact:
Re: authenticating with secure LDAP
We have just put a document together explaining how to utilized self signed certificates with Active Directory (LDAP)
http://assets.nagios.com/downloads/nagi ... ponent.pdf
http://assets.nagios.com/downloads/nagi ... ponent.pdf
Re: authenticating with secure LDAP
I was able to get this working using this PDF along with the outline provided by vitki.net noted at the bottom of the pdf.
Our environment uses internal signed certificates and not self signed.
So I acquired each of the CA public certs to complete the chain, ran the openssl cmmand to convert them to PEM format, and appended then to the cacerts file.
Thanks for you help
Our environment uses internal signed certificates and not self signed.
So I acquired each of the CA public certs to complete the chain, ran the openssl cmmand to convert them to PEM format, and appended then to the cacerts file.
Thanks for you help