<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HPE Oneview openldap in HPE OneView</title>
    <link>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6978515#M2203</link>
    <description>So, why are you using 389 for secure LDAP? The proper port is 636.&lt;BR /&gt;&lt;BR /&gt;Sent from my Windows 10 phone</description>
    <pubDate>Fri, 29 Sep 2017 20:18:50 GMT</pubDate>
    <dc:creator>ChrisLynch</dc:creator>
    <dc:date>2017-09-29T20:18:50Z</dc:date>
    <item>
      <title>oneview openldap</title>
      <link>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6976675#M2197</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I'm trying to configure openldap on oneview but when I insert the server certificate the system says that:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;The certificate entered for server 192.168.252.155:389 does not appear to be a valid certificate.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I'm very confident that the certificate is valid... How to debug this error to find out why I'm receiving this message?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;All my settings:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Model HPE OneView VM - VMware vSphere&lt;BR /&gt;Firmware Version 3.10.04-0299553&lt;BR /&gt;Date Jun 9, 2017&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;My openldap port is 389 and it uses TLS (Is oneview&amp;nbsp;using TLS too?)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Sep 2017 13:50:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6976675#M2197</guid>
      <dc:creator>ditidiapl</dc:creator>
      <dc:date>2017-09-15T13:50:15Z</dc:date>
    </item>
    <item>
      <title>Re: HPE Oneview openldap</title>
      <link>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6976777#M2198</link>
      <description>&lt;P&gt;Have you tried checking your cert on a cert checking website?&lt;/P&gt;&lt;P&gt;A message saying "not valid" isn't particularly helpful, more details would help.&lt;/P&gt;</description>
      <pubDate>Sun, 17 Sep 2017 01:38:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6976777#M2198</guid>
      <dc:creator>Dennis Handly</dc:creator>
      <dc:date>2017-09-17T01:38:19Z</dc:date>
    </item>
    <item>
      <title>Re: HPE Oneview openldap</title>
      <link>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6977122#M2199</link>
      <description>&lt;P&gt;Hello Dennis&lt;/P&gt;&lt;P&gt;The certificate is self-signed&lt;/P&gt;&lt;P&gt;The certificate is OK because others services connect normaly to ldap using TLS.&lt;/P&gt;&lt;P&gt;My ldap-server works on port 389 using TLS, I don't know if &amp;nbsp;Oneview supports TLS.&lt;/P&gt;&lt;P&gt;The only thing that oneview shows is:&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;EM&gt;The certificate entered for server 192.168.252.155:389 does not appear to be a valid certificate.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;For assistance, contact your administrator.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;My ldap certificate&amp;nbsp;is bellow if you wanna test, and it looks ok:&lt;/P&gt;&lt;P style="padding-left: 60px;"&gt;&lt;EM&gt;&amp;gt; openssl x509 -in /tmp/ldap-consumer.pem -text -noout&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Certificate:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Data:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Version: 3 (0x2)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Serial Number: 1376575537 (0x520ce031)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Signature Algorithm: sha256WithRSAEncryption&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Issuer: CN=UFFS&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Validity&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Not Before: Aug 15 14:05:37 2013 GMT&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Not After : Aug 10 14:05:37 2033 GMT&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subject: O=UFFS, CN=srv-ldap-consumer-01.uffs.edu.br&lt;/EM&gt;&lt;/P&gt;&lt;P style="padding-left: 60px;"&gt;&lt;EM&gt;....&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-----BEGIN CERTIFICATE-----&lt;BR /&gt;MIIC6TCCAaGgAwIBAgIEUgzgMTANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDEwRV&lt;BR /&gt;RkZTMB4XDTEzMDgxNTE0MDUzN1oXDTMzMDgxMDE0MDUzN1owOjENMAsGA1UEChME&lt;BR /&gt;VUZGUzEpMCcGA1UEAxMgc3J2LWxkYXAtY29uc3VtZXItMDEudWZmcy5lZHUuYnIw&lt;BR /&gt;gZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKPl4hksCzKMvVgh5C9vm2tp3xll&lt;BR /&gt;ZUmHumIYCqoqFsDl+30ry+FypTbBWvJRHp4sfK3Q0MgQw8nBL+PzJJ4MnG/A5vuo&lt;BR /&gt;KHeQ4rPpAIK8kkI1yrZMMg3SPNUtUyqz+FxtvbFJm0qREEkTYMvPyZ4ZuVlmjTP/&lt;BR /&gt;Cq72tTa7PyxuXkO3AgMBAAGjdjB0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYI&lt;BR /&gt;KwYBBQUHAwEwDwYDVR0PAQH/BAUDAwegADAdBgNVHQ4EFgQUDUVQ0MUtmZxmMNA7&lt;BR /&gt;B85gS8CC6vQwHwYDVR0jBBgwFoAUhywqJ9iLCh9BvD3THAhmgoaZCVcwDQYJKoZI&lt;BR /&gt;hvcNAQELBQADggExAJH6QRyU/gTTc8Xfk87YfFLu4F+HBQUydQ5jiGfsywUO8VO2&lt;BR /&gt;7j0LvZ1lDN4xBVa9zOvmBgWs9W13X8MzR/HSSy0AvcncrOZDSl8lTPh7DvylqUQ5&lt;BR /&gt;K5QY48QqWfIDn5eTRtsrxDWbjirTg09LRVkiI8Gl8PP2OMqDP7TqHFO+7Poz9OVB&lt;BR /&gt;yjhlnDgDmMVjQ3/LOS7e9M/qL48F93YOSiG6ncu9ebk4f43wdUnbSyWYdr9HjhAc&lt;BR /&gt;WWjW5+X0XfkXrfTfZnr+NgHglPTzFvb9qA6lZSNW7b9BHJpKVIOPFgGAQqxXRiIB&lt;BR /&gt;C5kXEVBKTUrFfEFpTQwW0Lx4+VJUqauSCrFkzGBrOJD/91Mg26dpNzy+CDdkDGIr&lt;BR /&gt;JmZVwpCVdYe14zSKi8N8gCtIMtkV4Qus2i6Fy9A=&lt;BR /&gt;-----END CERTIFICATE-----&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks..&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2017 12:03:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6977122#M2199</guid>
      <dc:creator>ditidiapl</dc:creator>
      <dc:date>2017-09-18T12:03:06Z</dc:date>
    </item>
    <item>
      <title>Re: HPE Oneview openldap</title>
      <link>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6977171#M2200</link>
      <description>&lt;P&gt;Yes, OneView does support TLS in many places.&amp;nbsp; I see your cert does have the "Server Authentication" extension set.&amp;nbsp; I will look into this and report back.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2017 18:38:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6977171#M2200</guid>
      <dc:creator>ChrisLynch</dc:creator>
      <dc:date>2017-09-18T18:38:27Z</dc:date>
    </item>
    <item>
      <title>Re: HPE Oneview openldap</title>
      <link>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6977864#M2201</link>
      <description>&lt;P&gt;&amp;gt;The certificate is self-signed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's not self-signed.&amp;nbsp; I.e. the Issuer and Subject don't match:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Issuer: CN=UFFS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Subject: O=UFFS, CN=srv-ldap-consumer-01.uffs.edu.br&lt;/P&gt;&lt;P&gt;You didn't post your CA so I can't verify it.&lt;/P&gt;&lt;P&gt;As Chris says you have these extensions:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; X509v3 extensions:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; X509v3 Basic Constraints: critical&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CA:FALSE&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; X509v3 Extended Key Usage:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TLS Web Server Authentication&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; X509v3 Key Usage: critical&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Digital Signature, Key Encipherment&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; X509v3 Subject Key Identifier:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0D:45:50:D0:C5:2D:99:9C:66:30:D0:3B:07:CE:60:4B:C0:82:EA:F4&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; X509v3 Authority Key Identifier:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; keyid:87:2C:2A:27:D8:8B:0A:1F:41:BC:3D:D3:1C:08:66:82:86:99:09:57&lt;/P&gt;</description>
      <pubDate>Mon, 25 Sep 2017 03:27:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6977864#M2201</guid>
      <dc:creator>Dennis Handly</dc:creator>
      <dc:date>2017-09-25T03:27:14Z</dc:date>
    </item>
    <item>
      <title>Re: HPE Oneview openldap</title>
      <link>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6978503#M2202</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;The first certificate that I have posted is not actually our main ldap server. But I have tested with our ldap main server and it gives the same error.&lt;/P&gt;&lt;P&gt;This is the certificate of our main ldap server&lt;/P&gt;&lt;P&gt;-----BEGIN CERTIFICATE-----&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;MIIDPzCCAfegAwIBAgIEU+4I3zANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDEwRV&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;RkZTMB4XDTE0MDgxNTEzMTkyN1oXDTQyMTAyNzEzMTkyN1owDzENMAsGA1UEAxME&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;VUZGUzCCAVIwDQYJKoZIhvcNAQEBBQADggE/ADCCAToCggExAODy5VlhB525BJCy&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;HD49mw8k9nljW/C0Z9wbwAa7BaYidU6WseezwsW0XKgB1cxKRCEfFt5TvAUxLUmk&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;rqR4FlDj23zGkQN9jIuKIvTuX6xhmDcoJdzbKhE6WYbEbYZTWPBQB3rumhqqrZk1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;yQGeGWDQ97ki+tbaY2RBLpSUoI8r3FHzXMfDm8ncrKA7nIl71JUSib6YSkoMePix&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;A9CtLRc6NBmFZ9gPVv3MC/AbZIUzSKmVpfGXlkYXWao49cmOngMJppZOiKL16TAM&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;hPZ9vEctCcaHY1oFJQTSZFmgRqhxM+MHNDePnxZrCalSo5EyLfLRfMqEBfgv6Zw4&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;HbdlrqR6qDB3fdNBKSSEGD2UUuNJdFCr3FjSbvzqYOgMTYtGuwJYjTMJzxc/9pN1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;QMyRwXMCAwEAAaNDMEEwDwYDVR0TAQH/BAUwAwEB/zAPBgNVHQ8BAf8EBQMDBwQA&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;MB0GA1UdDgQWBBSHLCon2IsKH0G8PdMcCGaChpkJVzANBgkqhkiG9w0BAQsFAAOC&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ATEAQan3jtFsOobn+HqOtQUxSyN4Fw+pmYTSCqeF3NfQnsqQnbaby/sO2QQl2kMF&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Csv0jyOa3H1+1OnSqqB5Di8G1gs6JxFWpawDSvdu8MrfiOMkOjFvWFOAK+OX1vox&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;5aVKOFsMvPosjQo88YjnVCXCBtOrr+wsaXcKzDEWYEO01uVBcfV9+pzeYSBXVq7t&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;VwPLCNEfu/1wgeEtqvkTC8hxXEh4r28X28Hop6WhlIC5YBfmateXkXFfia0wKkW3&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;mhzm4iQlAmLZIgTpjadDcMljHKJeB7EOGERtytG0a18DQW6W19rxy3L+ius5eQNX&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;8evSty0kL7GX64swCgi/jWJGkY/d6c7kgceLDZmpAP1vXOzuTNMQDp9jPFIV91iJ&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;45tQjJC38VVXLEct3c9lRxW1bg==&lt;/FONT&gt;&lt;BR /&gt;-----END CERTIFICATE-----&lt;/P&gt;&lt;P&gt;This certificate is used by various systems and they connect successfully to our ldap server using tls on the port 389&lt;/P&gt;&lt;P&gt;But&amp;nbsp;it is not working with oneview:&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN class="hp-form-message-text"&gt;The certificate entered for server 192.168.252.154:389 does not appear to be a valid certificate.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This certificate is valid:&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;# openssl verify cacert.pem&lt;/P&gt;&lt;P style="padding-left: 60px;"&gt;&lt;EM&gt;cacert.pem: CN = UFFS&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;error 18 at 0 depth lookup:self signed certificate&lt;/EM&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;OK&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;How&amp;nbsp;to find out more information why oneview is not accepting this certificate?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Sep 2017 17:35:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6978503#M2202</guid>
      <dc:creator>ditidiapl</dc:creator>
      <dc:date>2017-09-29T17:35:38Z</dc:date>
    </item>
    <item>
      <title>Re: HPE Oneview openldap</title>
      <link>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6978515#M2203</link>
      <description>So, why are you using 389 for secure LDAP? The proper port is 636.&lt;BR /&gt;&lt;BR /&gt;Sent from my Windows 10 phone</description>
      <pubDate>Fri, 29 Sep 2017 20:18:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6978515#M2203</guid>
      <dc:creator>ChrisLynch</dc:creator>
      <dc:date>2017-09-29T20:18:50Z</dc:date>
    </item>
    <item>
      <title>Re: HPE Oneview openldap</title>
      <link>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6978678#M2204</link>
      <description>&lt;P&gt;Our server is LDAPv3 and uses StartTLS on port 389.&amp;nbsp;&lt;/P&gt;&lt;P&gt;More information: &lt;A href="http://www.openldap.org/faq/data/cache/605.html" target="_blank"&gt;http://www.openldap.org/faq/data/cache/605.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Oct 2017 11:42:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6978678#M2204</guid>
      <dc:creator>ditidiapl</dc:creator>
      <dc:date>2017-10-02T11:42:53Z</dc:date>
    </item>
    <item>
      <title>Re: HPE Oneview openldap</title>
      <link>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6978695#M2205</link>
      <description>Yes, I am aware of that. The docs you linked to state:&lt;BR /&gt;&lt;BR /&gt;It requires use of separate port, commonly 636.&lt;BR /&gt;&lt;BR /&gt;So, trying to understand why you are using the unsecure port (389/tcp) for secure traffic.&lt;BR /&gt;&lt;BR /&gt;Sent from my Windows 10 phone</description>
      <pubDate>Mon, 02 Oct 2017 14:59:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6978695#M2205</guid>
      <dc:creator>ChrisLynch</dc:creator>
      <dc:date>2017-10-02T14:59:26Z</dc:date>
    </item>
    <item>
      <title>Re: HPE Oneview openldap</title>
      <link>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6978826#M2206</link>
      <description>&lt;P&gt;Using TLS&amp;nbsp;the comunication is encrypted so it is Secure.&lt;/P&gt;&lt;P&gt;But the server allows comunication without TLS&amp;nbsp;(that is insecure) because some information is not sensitive like consulting the user catalog by an e-mail client or who&amp;nbsp;is calling&amp;nbsp;by our telephone system.&lt;/P&gt;&lt;P&gt;Systems that consult sensitive information like autentication we configure them to use TLS...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Oct 2017 11:49:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6978826#M2206</guid>
      <dc:creator>ditidiapl</dc:creator>
      <dc:date>2017-10-03T11:49:03Z</dc:date>
    </item>
    <item>
      <title>Re: HPE Oneview openldap</title>
      <link>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6979208#M2207</link>
      <description>&lt;P&gt;Apologies for the late reply.&amp;nbsp; StartTLS is not the same as Secure OpenLDAP, and unfortunately, HPE OneView does not support today.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2017 12:47:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6979208#M2207</guid>
      <dc:creator>ChrisLynch</dc:creator>
      <dc:date>2017-10-06T12:47:47Z</dc:date>
    </item>
    <item>
      <title>Re: HPE Oneview openldap</title>
      <link>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6979371#M2208</link>
      <description>&lt;P&gt;&amp;gt; This is the certificate of our main ldap server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, that's the CA for your other cert.&amp;nbsp; openssl likes them.&lt;/P&gt;&lt;P&gt;But this seems odd: Public-Key: (2432 bit)&lt;/P&gt;&lt;P&gt;Hmm, I thought they only came in powers of two?&amp;nbsp; I.e. 2048.&lt;/P&gt;&lt;P&gt;But I see google finds a few mentions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2017 03:13:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6979371#M2208</guid>
      <dc:creator>Dennis Handly</dc:creator>
      <dc:date>2017-10-09T03:13:40Z</dc:date>
    </item>
    <item>
      <title>Re: HPE Oneview openldap</title>
      <link>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6979459#M2209</link>
      <description>&lt;P&gt;Thanks for you support&lt;/P&gt;&lt;P&gt;Since starttls&amp;nbsp;is not currently supported by oneview&amp;nbsp;we will create users manually in the server.&lt;/P&gt;&lt;P&gt;I hope someday&amp;nbsp;&lt;SPAN&gt;oneview&lt;/SPAN&gt; will be updated to recognize starttls because ldaps is deprecated&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ldaps:// is deprecated in favor of Start TLS [RFC2830]. &lt;A title="reference" href="http://www.openldap.org/faq/data/cache/605.html" target="_blank"&gt;reference&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2017 11:21:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/oneview-openldap/m-p/6979459#M2209</guid>
      <dc:creator>ditidiapl</dc:creator>
      <dc:date>2017-10-09T11:21:10Z</dc:date>
    </item>
  </channel>
</rss>

