Unable to use TLS/SSL LDAP Auth after ADM upgrade to latest build 13.0-71.40 - TLS Handshake fails with "Unknown CA"
book
Article ID: CTX289902
calendar_today
Updated On:
Description
After upgrading ADM to latest build 13.0-71.40 External Authentication fails when LDAP Server is configured using Security type SSL and TLS.
When retrieving Attributes on LDAP Server config from ADM GUI throw this error :: "LDAP IP Address or Port Number provided is invalid."

Network trace shows ADM is unable to trust/recognize LDAP Server Certificate ::

Resolution
Permanent fix provided in next build ADM 13.0-76.xx and above.
Workaround ::
=====================
Execute one of these commands in ADM CLI to overwrite Certificate attribute retrieval faulty code. Customers can keep the existing LDAP Settings, no need to change anything. External authentication should work correctly now over SSL/TLS Security.
For SSL
LDAPTLS_REQCERT=never ldapsearch -D CN=[service_account],CN=users,DC=lab,DC=com -H ldaps://[ldap_ip]:636 -b DC=lab,DC=com -A -o nettimeout=3 -w [passwd]
For TLS
LDAPTLS_REQCERT=never ldapsearch -D CN=[service_account],CN=users,DC=lab,DC=com -H ldap://[ldap_ip]:389 -b DC=lab,DC=com -Z -A -o nettimeout=3 -w [passwd]
To tailor the commands to any specific needs based on LDAP config, do from CLI "ldapsearch -?" for complete command details.
Options used
===========
ldapsearch is FreeBSD built-in command
-D binddn : bind DN
-H URI : LDAP Uniform Resource Identifier(s)
-b basedn : base dn for search
-Z : Start TLS request (-ZZ to require successful response)
-A : retrieve attribute names only (no values)
-o <opt>[=<optparam>] : general options
-w password
Customers can safely proceed and configure LDAP server with security type TLS/SSL. There wouldn’t be any impact.
Problem Cause
Issue created by Bug # NSHELP-26018.
ADM is unable to retrieve LDAP Server certificate due to improper certificate file permissions.
Was this article helpful?
thumb_up
Yes
thumb_down
No