Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for LDAP with SSL #24

Open
maheshp opened this issue May 29, 2017 · 3 comments
Open

Add support for LDAP with SSL #24

maheshp opened this issue May 29, 2017 · 3 comments

Comments

@maheshp
Copy link
Contributor

maheshp commented May 29, 2017

In the in-built implementation the end-users have to imports the certificates directly into java's cacerts. This is usually problematic as users may move to a different system and their ldap authentication stops working suddenly. The issue also comes if their switch to a different version of java. They need to re-import all the certs. Since this is moving to a plugin, could we provide an option in auth-config for the plugin to specify the certs in order to avoid the same issue that we have with the in-built one.

@nskalis
Copy link

nskalis commented Oct 19, 2018

hi @maheshp could you please describe teh procedure for adding a certificate into gocd in order this plugin to work ?

@nskalis
Copy link

nskalis commented Oct 30, 2018

the process of setting up a certificate to work with LDAPS looks like this:

keytool  -import -storepass changeit -noprompt -alias xxx  -keystore /usr/lib/jvm/java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.x86_64/jre/lib/security/cacerts -trustcacerts -file xxx
Certificate was added to keystore

and then in order to trust the certificate you do what is described here:
https://www.happyassassin.net/2015/01/14/trusting-additional-cas-in-fedora-rhel-centos-dont-append-to-etcpkitlscertsca-bundle-crt-or-etcpkitlscert-pem/

@Jan-Wosnitza-stillalive

For the upcoming folks:
If you try to bind to Azure AD, make sure to this url ldaps://[DNS or IP]:636 :)
Since the certificate is not self-signed it works out of the box.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants