On Tue, Jun 21, 2011 at 2:51 PM, Rich Megginson <rmegg...@redhat.com> wrote:

> **
> On 06/21/2011 11:52 AM, solarflow99 wrote:
>
> On Tue, Jun 21, 2011 at 1:39 PM, Rich Megginson <rmegg...@redhat.com>wrote:
>
>>  On 06/21/2011 11:23 AM, solarflow99 wrote:
>>
>>  I'm using self signed certs, did I miss something?
>>
>>   Probably.  There are many steps involved in getting winsync to use
>>> TLS/SSL to talk to AD, and getting AD PassSync to use TLS/SSL to talk to
>>> DS.  Which
>>>
>>
>> From the Docs listed online:
>> http://docs.redhat.com/docs/en-US/Red_Hat_Directory_Server/8.1/html/Administration_Guide/Windows_Sync-Configuring_Windows_Sync.html
>>
>>  The 8.2 docs are better
>>
>> http://docs.redhat.com/docs/en-US/Red_Hat_Directory_Server/8.2/html-single/Administration_Guide/index.html#Windows_Sync-About_Windows_Sync
>>
>> and I went over everything else I could possibly find too.  It seems in
>> the case of self signed certificates,
>>
>>  Are you talking about self signed certs for 389 or for AD?
>>
>
> I guess that would be both.  This is all internal so no servers need real
> third party signed certificates, just trying to get it to work.
>
> Ok, I'm confused.  The RHDS 8.2 Admin Guide talks about setting up AD for
> TLS/SSL by installing the MS CA in Enterprise Root CA mode, creating a cert
> request, and using MS CA to issue the AD server cert.  It doesn't say
> anything about creating self signed certs for AD.
>

Ya, thats what I mean.  It would be nice if there was an example of getting
this to work with self signed certs.  I could add that to the wiki if that
would useful for anyone else.



# /usr/lib64/mozldap/ldapsearch -v -Z -P
/etc/dirsrv/slapd-ldapserver/cert8.db -h 10.10.10.210 -p 636 -D
"cn=administrator" -w mypassword -b "cn=users,dc=389testdomain,dc=local"
"objectclass=*"
ldapsearch: started Tue Jun 21 08:41:15 2011

ldap_init( 10.10.10.210, 636 )
ldaptool_getcertpath -- /etc/dirsrv/slapd-ldapserver/cert8.db
ldaptool_getkeypath -- /etc/dirsrv/slapd-ldapserver/cert8.db
ldaptool_getmodpath -- (null)
ldaptool_getdonglefilename -- (null)
ldap_simple_bind: Invalid credentials
ldap_simple_bind: additional info: 80090308: LdapErr: DSID-0C0903A9,
comment: AcceptSecurityContext error, data 52e, v1db1

>  -D "cn=administrator"
> You have to use the full DN - something like -D
> "cn=administrator,cn=users,dc=389testdomain,dc=local"
>

Got it! thanks,
--
389 users mailing list
389-us...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/389-users

Reply via email to