- Community Home
- >
- Software
- >
- HPE OneView
- >
- OneView Synergy - Setting up LDAP via PowerShell
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-10-2021 02:56 AM - last edited on 11-10-2021 09:12 PM by support_s
11-10-2021 02:56 AM - last edited on 11-10-2021 09:12 PM by support_s
OneView Synergy - Setting up LDAP via PowerShell
OneView Synergy 6.3
When attempting to setup a LDAP Directory via powershell cmdlets, I get the below error. When setting up via the web interface, I am able to set it up, but I have to check force leaf cert since we are using the CA cert from AD.
Is there anyway for me to accomplish this via script, or is the only way to accomplish this is via the web since I am utlizing the AD cert and forcing the leaf cert.
Command example:
$LdapAuthDirectory = New-OVLdapDirectory -Name 'domain.local' -AD -BaseDN 'dc=domain,dc=local' -servers $dc1,$dc2 @AuthParams
Error:
New-OVLdapDirectory : Unable to establish trusted communication with the server. The certificate of the root CA that has authorized the directory server certificate is not present in the OneView trust store. Unable to establish trusted communication with
the server. The certificate of the root CA that has authorized the directory server certificate is not present in the OneView trust store.
Cheers!
- Tags:
- OneView
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-10-2021 02:07 PM
11-10-2021 02:07 PM
Re: OneView Synergy - Setting up LDAP via PowerShell
[Any personal opinions expressed are mine, and not official statements on behalf of Hewlett Packard Enterprise]

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-10-2021 02:09 PM
11-10-2021 02:09 PM
Re: OneView Synergy - Setting up LDAP via PowerShell
Yea - shortly after i posted I found that if I ran this on both of my DCs, i did not get the CA error - this seems to have worked.
Add-OVApplianceTrustedCertificate -ComputerName $DCServer1 -Port 636 -Force
Add-OVApplianceTrustedCertificate -ComputerName $DCServer2 -Port 636 -Force
Thanks Chris
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-10-2021 08:31 PM
11-10-2021 08:31 PM
Re: OneView Synergy - Setting up LDAP via PowerShell
While yes, those commands will work, it isn't what we advise or recommend. Instead, you should either get the certificate chain, or you could have used the -TrustCertChain parameter with Add-OVApplianceTrustedCertificate Cmdlet when you attempted to add the cert from one of your domain controllers. So, the Cmdlet should have been:
$DCServer1 = "mydc-name.mydomain.com"
Add-OVApplianceTrustedCertificate -ComputerName $DCServer1 -Port 636 -TrustCertChain
This way, the cert chain will be added to the appliance trust store, so the domain controllers leaf certificate is not explicitly trusted. As I stated, if that cert expires, you will need to update it manually. By trusting the chain instead, the appliance will implicitly trust the leaf certificate when it is re-issued.
[Any personal opinions expressed are mine, and not official statements on behalf of Hewlett Packard Enterprise]
