diff --git a/guides/common/modules/con_using-ldap.adoc b/guides/common/modules/con_using-ldap.adoc index bfc7352cb92..0997441a92e 100644 --- a/guides/common/modules/con_using-ldap.adoc +++ b/guides/common/modules/con_using-ldap.adoc @@ -4,8 +4,6 @@ {Project} supports LDAP authentication using one or multiple LDAP directories. Your LDAP server must comply with the link:https://datatracker.ietf.org/doc/html/rfc2307[RFC 2307] schema. -If you require {ProjectName} to use `TLS` to establish a secure LDAP connection (LDAPS), first obtain certificates used by the LDAP server you are connecting to and mark them as trusted on the base operating system of your {ProjectServer} as described below. -If your LDAP server uses a certificate chain with intermediate certificate authorities, all of the root and intermediate certificates in the chain must be trusted, so ensure all certificates are obtained. If you do not require secure LDAP at this time, proceed to xref:Configuring_Project_to_Use_LDAP_{context}[]. [IMPORTANT] diff --git a/guides/common/modules/proc_configuring-tls-for-secure-ldap.adoc b/guides/common/modules/proc_configuring-tls-for-secure-ldap.adoc index 923e1ac50a2..dfe8feb54d0 100644 --- a/guides/common/modules/proc_configuring-tls-for-secure-ldap.adoc +++ b/guides/common/modules/proc_configuring-tls-for-secure-ldap.adoc @@ -1,39 +1,31 @@ [id="Configuring_TLS_for_Secure_LDAP_{context}"] = Configuring TLS for secure LDAP -Use the {Project} CLI to configure TLS for secure LDAP (LDAPS). +If {Project} uses TLS to establish a secure LDAP connection (LDAPS), you must obtain the CA certificates of your LDAP server and add them to the trusted CA list on the base operating system of your {ProjectServer}. + +If your LDAP server uses a certificate chain with intermediate certificate authorities, you must obtain all root and intermediate certificates and add them to the trusted CA list. .Procedure -. Obtain the Certificate from the LDAP Server. -.. If you use Active Directory Certificate Services, export the Enterprise PKI CA Certificate using the Base-64 encoded X.509 format. +. Obtain the CA certificate from the LDAP Server: +.. If you use Active Directory Certificate Services, export the Enterprise PKI CA Certificate using the Base64 encoded X.509 format. ifndef::orcharhino[] See https://access.redhat.com/solutions/1498773[How to configure Active Directory authentication with `TLS` on {Project}] for information on creating and exporting a CA certificate from an Active Directory server. endif::[] -.. Download the LDAP server certificate to a temporary location onto {ProjectServer} and remove it when finished. +.. Download the LDAP server certificate to a temporary location on the {ProjectServer}, such as `/tmp/_example.crt_`. +You will remove the certificate when finished. + -For example, `/tmp/example.crt`. The filename extensions `.cer` and `.crt` are only conventions and can refer to DER binary or PEM ASCII format certificates. -. Trust the Certificate from the LDAP Server. -+ -{ProjectServer} requires the CA certificates for LDAP authentication to be individual files in `/etc/pki/tls/certs/` directory. - -.. Use the `install` command to install the imported certificate into the `/etc/pki/tls/certs/` directory with the correct permissions: -+ -[options="nowrap", subs="+quotes,verbatim,attributes"] ----- -# install /tmp/_example.crt_ /etc/pki/tls/certs/ ----- -.. Enter the following command as `root` to trust the _example.crt_ certificate obtained from the LDAP server: +. Add the LDAP server certificate to the system truststore: +.. Import the certificate: + [options="nowrap", subs="+quotes,verbatim,attributes"] ---- -# ln -s _example.crt_ /etc/pki/tls/certs/$(openssl \ -x509 -noout -hash -in \ -/etc/pki/tls/certs/_example.crt_).0 +# cp /tmp/_example.crt_ /etc/pki/tls/source/anchors ---- -.. Restart the `httpd` service: +.. Update the certificate authority truststore: + [options="nowrap", subs="+quotes,verbatim,attributes"] ---- -# systemctl restart httpd +# update-ca-trust extract ---- +. Delete the downloaded LDAP certificate from the temporary location on your {ProjectServer}.