<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Schema-free directory settings. Which certificate is meant to be imported in Server Management - Remote Server Management</title>
    <link>https://community.hpe.com/t5/server-management-remote-server/schema-free-directory-settings-which-certificate-is-meant-to-be/m-p/7201732#M9926</link>
    <description>&lt;P&gt;Hi.&lt;BR /&gt;&lt;BR /&gt;I have got it to work by importing the intermidiate+root certificate from our CA that also signs the Active directory servers LDAPS certificates.&lt;BR /&gt;The test still flags a warning&amp;nbsp;Certificate subject Mismatch, verify OK.&lt;BR /&gt;As the intermidiate+ root CA is only the chain for the active directory certificates it makes sence.&amp;nbsp;&lt;BR /&gt;I also tried setting the LDAP server setting to a specific Domain controller instead of the dns roundrobin for the domain and import the certificate for that server but the test cam up with the same warning. Looking at the certificate that i imported it did not report a subject either. So i guess if i want it to work with no warning i need to get a new certificate with either a wildcard *.domainname or point to a specific domaincontroller and get a certificate with that domaincontrollers name in the subject.&lt;BR /&gt;&lt;BR /&gt;Best ragards&lt;BR /&gt;Cederberg&lt;/P&gt;</description>
    <pubDate>Wed, 29 Nov 2023 07:34:47 GMT</pubDate>
    <dc:creator>Cederberg</dc:creator>
    <dc:date>2023-11-29T07:34:47Z</dc:date>
    <item>
      <title>Schema-free directory settings. Which certificate is meant to be imported</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/schema-free-directory-settings-which-certificate-is-meant-to-be/m-p/7200969#M9907</link>
      <description>&lt;P&gt;Hi.&lt;BR /&gt;We are looking in to using schema-free directory integration instead of the extended schema integration we have been using for years (Active directory).&lt;BR /&gt;My question is regarding the Certificate one can import. To me it's not very clear which Certificate we are meant to paste. I'm not a certificate expert and in my experiance different sfotware vendors mean different things when refering to a CA certificate.&lt;BR /&gt;Are we meant to import the exact certificate of the active directory server or the root + intermidate certificate which was used to issue/sign the certificate used on the Active directory server (Chain)?&lt;BR /&gt;Best Regards&lt;BR /&gt;//Cederberg&lt;/P&gt;</description>
      <pubDate>Mon, 04 Dec 2023 02:53:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/schema-free-directory-settings-which-certificate-is-meant-to-be/m-p/7200969#M9907</guid>
      <dc:creator>Cederberg</dc:creator>
      <dc:date>2023-12-04T02:53:01Z</dc:date>
    </item>
    <item>
      <title>Re: Schema-free directory settings. Which certificate is meant to be imported</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/schema-free-directory-settings-which-certificate-is-meant-to-be/m-p/7201297#M9916</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://community.hpe.com/t5/user/viewprofilepage/user-id/1079681" target="_self"&gt;&lt;SPAN class=""&gt;Cederberg&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I hope this guide helps you to import CA certificate&lt;A href="http://&amp;nbsp;https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;amp;docId=sd00001038en_us&amp;amp;page=GUID-03624D12-0B38-4C91-A64C-A76ADC362207.html" target="_blank" rel="noopener"&gt;&amp;nbsp;https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;amp;docId=sd00001038en_us&amp;amp;page=GUID-03624D12-0B38-4C91-A64C-A76ADC362207.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I hope even this Video might be a bit of help&lt;BR /&gt;&lt;A href="https://support.hpe.com/hpesc/public/videoDisplay?videoId=vtc00000858en_us" target="_blank" rel="noopener"&gt;https://support.hpe.com/hpesc/public/videoDisplay?videoId=vtc00000858en_us&lt;/A&gt;&lt;/P&gt;&lt;P&gt;You need to import a CA signed certificate which is Signed from the Active Directory in your case.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;BR /&gt;Manoj.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 04:22:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/schema-free-directory-settings-which-certificate-is-meant-to-be/m-p/7201297#M9916</guid>
      <dc:creator>GM_M</dc:creator>
      <dc:date>2023-11-22T04:22:53Z</dc:date>
    </item>
    <item>
      <title>Re: Schema-free directory settings. Which certificate is meant to be imported</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/schema-free-directory-settings-which-certificate-is-meant-to-be/m-p/7201304#M9917</link>
      <description>&lt;P&gt;Hi GM_M&lt;BR /&gt;I may be wrong here but the first link is to add a Web certificate to the ilo it self. The certificate i'm asking about is the one thats meant to verify that the LDAPS servers are using vaild certificates. It should be the chain, in our case the intermidiate + root certificate. But in other implementations from other manufacutrers it has been the exact certificate from the domain controller you need to point directly to.&lt;BR /&gt;In this link it only says import a new CA certificate&lt;BR /&gt;&lt;A href="https://support.hpe.com/hpesc/public/docDisplay?docId=sd00002007en_us&amp;amp;page=GUID-D7147C7F-2016-0901-06D0-000000000D16.html" target="_blank"&gt;https://support.hpe.com/hpesc/public/docDisplay?docId=sd00002007en_us&amp;amp;page=GUID-D7147C7F-2016-0901-06D0-000000000D16.html&lt;/A&gt;&lt;BR /&gt;So im confused as to what certificate to use. I know i can skip importing a certificate and it will not verify the LDAPS certificate but that will lower the security implemented as it will accept any certificate then.&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;//Cederberg&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 07:05:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/schema-free-directory-settings-which-certificate-is-meant-to-be/m-p/7201304#M9917</guid>
      <dc:creator>Cederberg</dc:creator>
      <dc:date>2023-11-22T07:05:48Z</dc:date>
    </item>
    <item>
      <title>Re: Schema-free directory settings. Which certificate is meant to be imported</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/schema-free-directory-settings-which-certificate-is-meant-to-be/m-p/7201730#M9925</link>
      <description>&lt;P&gt;Kindly try to import the root certificate of the AD (Active Directory) in order to work.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2023 07:24:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/schema-free-directory-settings-which-certificate-is-meant-to-be/m-p/7201730#M9925</guid>
      <dc:creator>Rama2</dc:creator>
      <dc:date>2023-11-29T07:24:12Z</dc:date>
    </item>
    <item>
      <title>Re: Schema-free directory settings. Which certificate is meant to be imported</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/schema-free-directory-settings-which-certificate-is-meant-to-be/m-p/7201732#M9926</link>
      <description>&lt;P&gt;Hi.&lt;BR /&gt;&lt;BR /&gt;I have got it to work by importing the intermidiate+root certificate from our CA that also signs the Active directory servers LDAPS certificates.&lt;BR /&gt;The test still flags a warning&amp;nbsp;Certificate subject Mismatch, verify OK.&lt;BR /&gt;As the intermidiate+ root CA is only the chain for the active directory certificates it makes sence.&amp;nbsp;&lt;BR /&gt;I also tried setting the LDAP server setting to a specific Domain controller instead of the dns roundrobin for the domain and import the certificate for that server but the test cam up with the same warning. Looking at the certificate that i imported it did not report a subject either. So i guess if i want it to work with no warning i need to get a new certificate with either a wildcard *.domainname or point to a specific domaincontroller and get a certificate with that domaincontrollers name in the subject.&lt;BR /&gt;&lt;BR /&gt;Best ragards&lt;BR /&gt;Cederberg&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2023 07:34:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/schema-free-directory-settings-which-certificate-is-meant-to-be/m-p/7201732#M9926</guid>
      <dc:creator>Cederberg</dc:creator>
      <dc:date>2023-11-29T07:34:47Z</dc:date>
    </item>
    <item>
      <title>Re: Schema-free directory settings. Which certificate is meant to be imported</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/schema-free-directory-settings-which-certificate-is-meant-to-be/m-p/7201967#M9930</link>
      <description>&lt;P dir="auto" style="margin: 0;"&gt;Yes, obtaining a wildcard certificate for *.domainname or obtaining a certificate specifically for the intended Domain Controller, with the Domain Controller's name included in the subject field, might eliminate the warning and ensure seamless LDAPS functionality. If you still encounter any issues, kindly raise a ticket with HPE for further troubleshooting&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2023 02:55:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/schema-free-directory-settings-which-certificate-is-meant-to-be/m-p/7201967#M9930</guid>
      <dc:creator>Rama2</dc:creator>
      <dc:date>2023-12-01T02:55:17Z</dc:date>
    </item>
  </channel>
</rss>

