Summary: What are the steps to configure SRM to change the authentication from LDAP to LDAPS
Detailed Article
Instructions
Below are the steps to configure SRM to change the authentication from LDAP to LDAPS over SSL port 636
1. Log in to the SRM frontend host using SSH
2. Run the following OpenSSL command to retrieve the LDAP server certificate and store it in a text file:
openssl s_client -showcerts -connect <FQDN_of_LDAP_Host>:636 > /tmp/ldapcert.txt
3. Once the command runs, press Ctrl+C to terminate the process. The certificate file will be saved as /tmp/ldapcert.txt
4. Open the certificate file using vi or another text editor
5. The file may contain multiple certificates, each enclosed between -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- like shown
below
-----BEGIN CERTIFICATE----
MIIDczCCAlugAwIBAgIUWl4e4UjN1uXG3nIC6gfaj39m4HgwDQYJKoZIhvcNAQEL
BQAwZDELMAkGA1UEBhMCVVMxFTATBgNVBAoTDEV4YW1wbGUgQ29ycDEmMCQGA1UE
AxMdRXhhbXBsZSBSb290IENBIDIwMTkwHhcNMjIxMTI3MTAyNzU1WhcNMzIxMTI0
MTAyNzU1WjBkMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRXhhbXBsZSBDb3JwMSYw
....
-----END CERTIFICATE----
6. The first certificate in the file is the root certificate. Copy the entire first certificate, including the BEGIN CERTIFICATE and END CERTIFICATE
lines as shown above. Note that the above is just an example.
7. Create a new file in the /tmp directory and paste the copied certificate content.
Paste the copied certificate content and save the file.
8. Verify that the file is created successfully
Expected output:
-rw-r--r-- 1 root root 2468 Month dd hh:mm cert.pem
9. Move the certificate to the Java custom certificates directory
cp /tmp/cert.pem /opt/APG/Java/Sun-JRE/version/customcerts/
10. Change to the custom certificates directory
cd /opt/APG/Java/Sun-JRE/version/customcerts/
11. Change the ownership of the certificate to the apg user:
12. Verify the file ownership and permissions:
Expected output:
-rw-r--r-- 1 apg apg 2468 Month dd hh:mm cert.pem
13. Run the following script to import the certificate.
This will import all custom certificates in the above customcerts directory. If there are any other certificate files in this directory besides the one copied, move them to a separate directory temporarily if those need to be skipped.
/opt/APG/bin/generate-java-truststore.sh
Expected output:
Generating the Java certificates...
* Loading built-in Java certificates...
* Merging custom certificates...
* Saving certificates...
* 1 custom certificate added.
14. Once the certificate is imported, Log in to the SRM Admin UI.
15. Navigate to Users & Security > Authentication > Authentication Settings.
16. Change the Connection URL from
ldap://<FQDN_of_LDAP_Host>
to
ldaps://<FQDN_of_LDAP_Host>
Click Save
17. SSH to the Frontend host and restart the tomcat service
/opt/APG/bin/manage-modules.sh service restart tomcat
18. Once Tomcat restarts, log back into the SRM Admin UI
19. Navigate to Users & Security > Authentication > Authentication Settings
20. Click Test Realm to verify the connection.
21. If successful, LDAPS is now configured correctly for SRM