<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LDAPs fails in IMC</title>
    <link>https://community.hpe.com/t5/imc/solved-ldaps-fails/m-p/7089171#M5885</link>
    <description>&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Those links were helpful. My main misunderstanding was regarding the uploaded certificate in the IMC config.&lt;/P&gt;&lt;P&gt;I assumed it was supposed to be a client cert issued to the IMC server, NOT the cert created&amp;nbsp; using&amp;nbsp; the LDAP over SSL template and issued to the DC&lt;/P&gt;&lt;P&gt;Now it works&lt;/P&gt;&lt;P&gt;EDIT: downside, I'm running active and standby. The standby gets its configuration for this through the nightly backup as there is no option to configure much on the standby server. The regular LDAP config gets synced, but the LDAP over SSL does not get correctly configured. So make sure you have a local admin account configured as no authentication sever will be available.&lt;/P&gt;</description>
    <pubDate>Wed, 27 May 2020 15:49:05 GMT</pubDate>
    <dc:creator>NeilR</dc:creator>
    <dc:date>2020-05-27T15:49:05Z</dc:date>
    <item>
      <title>[SOLVED] LDAPs fails</title>
      <link>https://community.hpe.com/t5/imc/solved-ldaps-fails/m-p/7088410#M5878</link>
      <description>&lt;P&gt;&lt;STRONG&gt;javax.naming.CommunicationException: simple bind failed: SP-P-DC04.brookgreen.spgs.local:636 [Root exception is javax.net.ssl.SSLHandshakeException: No trusted certificate found]&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I have RootCA (MS ADCA) in every keystore on the IMC server that I think could be used.&lt;/P&gt;&lt;P&gt;Certificate is based on:&lt;/P&gt;&lt;P&gt;Template=LDAPoverSSL(1.3.6.1.4.1.311.21.8.16574533.5077679.4147093.4566469.16611918.39.9795857.15890548)&lt;BR /&gt;Major Version Number=100&lt;BR /&gt;Minor Version Number=3&lt;/P&gt;&lt;P&gt;It drives me nuts&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ldaps imc.PNG" style="width: 654px;"&gt;&lt;img src="https://community.hpe.com/t5/image/serverpage/image-id/115531iEC5FFD6A8C297DA6/image-size/large?v=v2&amp;amp;px=2000" role="button" title="ldaps imc.PNG" alt="ldaps imc.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 07:57:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/imc/solved-ldaps-fails/m-p/7088410#M5878</guid>
      <dc:creator>spgsitsupport</dc:creator>
      <dc:date>2020-05-22T07:57:18Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPs fails</title>
      <link>https://community.hpe.com/t5/imc/solved-ldaps-fails/m-p/7088742#M5881</link>
      <description>&lt;P&gt;Anybody any ideas?&lt;/P&gt;</description>
      <pubDate>Thu, 21 May 2020 18:08:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/imc/solved-ldaps-fails/m-p/7088742#M5881</guid>
      <dc:creator>spgsitsupport</dc:creator>
      <dc:date>2020-05-21T18:08:34Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPs fails</title>
      <link>https://community.hpe.com/t5/imc/solved-ldaps-fails/m-p/7088772#M5882</link>
      <description>&lt;P&gt;i tried to make it work as well. i had my DC certsrv issue a client cert to the user logging into LDAP/DC and uploaded that to imc. I figured it wanted a client cert that the DC would recognixe and It all looks ok. WIreshark shows it fails.&lt;/P&gt;&lt;P&gt;So I went back to the docs. They have an example but not for secure LDAp over SSL, so no help there as to how to set up the cert.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looks like its broken unless someone else has made it work.&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 00:00:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/imc/solved-ldaps-fails/m-p/7088772#M5882</guid>
      <dc:creator>NeilR</dc:creator>
      <dc:date>2020-05-22T00:00:28Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPs fails</title>
      <link>https://community.hpe.com/t5/imc/solved-ldaps-fails/m-p/7088801#M5883</link>
      <description>&lt;P&gt;Well, my AD server definitely works with LDAPs (LDAP over SSL) as tested with &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firesight-management-center/118761-technote-firesight-00.html" target="_blank" rel="noopener"&gt;ldp.exe &lt;/A&gt;&lt;/P&gt;&lt;P&gt;Certificate was issued by MS ADCA as per &lt;A href="https://support.microsoft.com/en-gb/help/321051/how-to-enable-ldap-over-ssl-with-a-third-party-certification-authority" target="_blank" rel="noopener"&gt;this&amp;nbsp;&lt;/A&gt;or even better &lt;A href="https://social.technet.microsoft.com/wiki/contents/articles/2980.ldap-over-ssl-ldaps-certificate.aspx" target="_blank" rel="noopener"&gt;this&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Just to make sure I did follow the bit in above writeup - Exporting the LDAPS Certificate and Importing for use with AD DS&lt;/P&gt;&lt;P&gt;And once imported to &lt;STRONG&gt;NTDS\Personal&lt;/STRONG&gt; IMC was OK to use provided certificate &amp;amp; do LDAPs connection!&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 07:59:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/imc/solved-ldaps-fails/m-p/7088801#M5883</guid>
      <dc:creator>spgsitsupport</dc:creator>
      <dc:date>2020-05-22T07:59:11Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPs fails</title>
      <link>https://community.hpe.com/t5/imc/solved-ldaps-fails/m-p/7089171#M5885</link>
      <description>&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Those links were helpful. My main misunderstanding was regarding the uploaded certificate in the IMC config.&lt;/P&gt;&lt;P&gt;I assumed it was supposed to be a client cert issued to the IMC server, NOT the cert created&amp;nbsp; using&amp;nbsp; the LDAP over SSL template and issued to the DC&lt;/P&gt;&lt;P&gt;Now it works&lt;/P&gt;&lt;P&gt;EDIT: downside, I'm running active and standby. The standby gets its configuration for this through the nightly backup as there is no option to configure much on the standby server. The regular LDAP config gets synced, but the LDAP over SSL does not get correctly configured. So make sure you have a local admin account configured as no authentication sever will be available.&lt;/P&gt;</description>
      <pubDate>Wed, 27 May 2020 15:49:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/imc/solved-ldaps-fails/m-p/7089171#M5885</guid>
      <dc:creator>NeilR</dc:creator>
      <dc:date>2020-05-27T15:49:05Z</dc:date>
    </item>
  </channel>
</rss>

