Configure secure connections for LDAP

If the LDAP server requires a secure connection, follow these steps to import the LDAP server Certificate Authority's root certificate into the Java truststore of Codar. If necessary, contact your LDAP administrator to obtain the LDAP server certificate.

If the LDAP server does not require a secure connection, you can omit this task.

Note If you have configured  Codar to be compliant with FIPS 140-2, you must substitute the Codar server truststore (for example, codar_server_truststore.p12) for the Java truststore (cacerts) and substitute the Codar server truststore password for the Java truststore password. See Create new keystore and truststore for secure communication for more information about the Codar server truststore and password.

  1. Open a command prompt and run the keytool utility with the following options to create a local trusted certificate entry for the LDAP server.

    Windows:

    "CSA_JRE_HOME\bin\keytool" -importcert -trustcacerts -alias ldap
    -keystore "CSA_JRE_HOME\lib\security\cacerts"
    -file <c:\certfile_name.cer> -storepass <password>

    Linux:

    CSA_JRE_HOME/bin/keytool -importcert -trustcacerts -alias ldap
    -keystore CSA_JRE_HOME/lib/security/cacerts
    -file </tmpcertfile_name.cert> -storepass <password>

    <c:\certfile_name.cer> on Windows or </tmp/certfile_name.cer> on Linux is the path and name of the Certificate Authority's root certificate for the LDAP server. The file extension may be .cer rather than .crt. You can also use a different value for -alias.

  2. At the prompt to import the certificate, type Yes.
  3. Press Enter.
  4. Restart Codar service, see Restart Codar.