389-DS Configuring LDAPS

From Notes_Wiki
Revision as of 07:04, 9 July 2025 by Akshay (talk | contribs) (Created page with "Home > Ubuntu > Ubuntu 22.04 > Ubuntu 22.04 389-DS server setup > 389-DS Configuring LDAPS = Configuring LDAPS in 389 Directory Server = == Step 1: Enable LDAPS Using dsconf == After the instance is created, use the `dsconf` command to configure security settings: <pre> dsconf -D "cn=Directory Manager" ldap://localhost security </pre> == Step 2: Set TLS Certificate and Key Paths == Configure the certificate, key, and CA paths. Also, en...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Home > Ubuntu > Ubuntu 22.04 > Ubuntu 22.04 389-DS server setup > 389-DS Configuring LDAPS

Configuring LDAPS in 389 Directory Server

Step 1: Enable LDAPS Using dsconf

After the instance is created, use the `dsconf` command to configure security settings:

dsconf -D "cn=Directory Manager" ldap://localhost security

Step 2: Set TLS Certificate and Key Paths

Configure the certificate, key, and CA paths. Also, enable the secure LDAPS port (636):

dsconf -D "cn=Directory Manager" ldap://localhost security set --tls-cert-file=server-cert.pem --tls-key-file=server-key.pem --tls-ca-file=ca-cert.pem

dsconf -D "cn=Directory Manager" ldap://localhost security set --secure-port=636 --secure-port-enabled=on

Step 3: Restart the Directory Server

Apply the changes by restarting the directory server:

dsctl slapd-YOUR_INSTANCE_NAME restart

Replace `YOUR_INSTANCE_NAME` with the actual instance name (e.g., `slapd-ldap`).

Step 4: Test LDAPS Connectivity

Use `ldapsearch` to confirm that LDAPS is functioning properly:

ldapsearch -H ldaps://localhost -x -b "dc=example,dc=com" -D "cn=Directory Manager" -W

Notes

  • Make sure that the certificate files are valid and readable by the directory server.
  • Ensure port 636 is open and not blocked by the firewall.


Home > Ubuntu > Ubuntu 22.04 > Ubuntu 22.04 389-DS server setup > 389-DS Configuring LDAPS