Enable SSL On SDS6.4 Using CA Certificates
Enable SSL On SDS6.4 Using CA Certificates
• Verify CA certificate
gsk8capicmd_64 -cert -list -db ca.kdb -stashed
gsk8capicmd_64 -certreq -create -db server.kdb -stashed -label ”LDAP CA certificate" -dn
"CN=ldapserverhost.ibm.com,OU=Austin,O=IBM" -file ldapcert_request.arm
• Transport both CA Root signer certificate and the newly signed CSR files to the LDAP server
Ø ca.arm
Ø ldapcert_signed.arm
Add and receive CA certificates into LDAP’s .kdb
Add and receive CA certificates into LDAP’s .kdb
• Add CA root signer certificate into LDAP’s server.kdb
gsk8capicmd_64 -cert -add -db server.kdb -stashed -label “CA Root Signer” -file ca.arm -format ascii -trust
enable
• Extract new LDAP CA signed certificate and share with client for SSL connections – if
needed.
gsk8capicmd_64 -cert -extract -db server.kdb -stashed -label “LDAP CA certificate" -target
ldapservercert.arm -format ascii
Configure LDAP instance with SSL
Configure LDAP instance with SSL
• Start
ibmslapd -I ldapinst –n
ibmdiradm -I ldapinst
• Verify if LDAP instance is running
ps -ef | grep ibmslapd
ps -ef | grep ibmdiradm
Test SSL
Test SSL
• NOTE:
Ø If the Certificate Authority (CA) that signed the client’s cert is different than the CA that signed the server’s certificate then
obtain a copy of this secondary CA and add it to the client’s .kdb. If the CA is the same then there is no further action
required on the client side.
Ø There is no need to add a copy of the LDAP server’s certificate into the client’s .kdb or viceversa.
• If needed add the missing CA root signer cert into the client’s .kdb
• Example:
gsk8capicmd_64 -cert -add -db client.kdb -stashed -label “A New CA Root Signer” -file ca.arm -format ascii -
trust enable
• Perform a secure connection to the LDAP server
idsldapsearch -Z -h <ldapserver_hostname> -p <secure_port> -D cn=root -w ? -K client.kdb -P <keydb
password> -s <scope> -b <base dn> objectclass=*
Hints & Tips
Hints & Tips
• If you –receive signed cert before adding the actual CA root signer certificate first, then you will get an
error similar to the one below:
gsk8capicmd_64 -cert -receive -db server.kdb -stashed -file ldapcert_signed.arm -default_cert yes
CTGSK2146W An invalid certificate chain was found.
• You can ignore the warning below if it is shown when receiving a new signed cert into the .kdb – always
verify with –cert –list if the cert has been added successfully.
gsk8capicmd_64 -cert -receive -db server.kdb -stashed -file ldapcert_signed.arm -default_cert yes
CTGSK3034W The certificate request created for the certificate is not in the key database
Hints & Tips
• If you don’t restart the LDAP instance after enabling SSL then you might get the error below when
running ldapsearch over SSL:
• You can validate a certificate using below sample command – the result should be OK.
gsk8capicmd_64 -cert -validate -db server.kdb -stashed -label "LDAP CA certificate"
OK
Useful Links
Follow us: © Copyright IBM Corporation 2020. All rights reserved. The information contained in these
materials is provided for informational purposes only, and is provided AS IS without
warranty of any kind, express or implied. Any statement of direction represents IBM’s
current intent, is subject to change or withdrawal, and represent only goals and objectives.
securitylearningacademy.com IBM, the IBM logo, and ibm.com are trademarks of International Business Machines Corp.,
registered in many jurisdictions worldwide. Other product and service names might be
trademarks of IBM or other companies. A current list of IBM trademarks is available on the
ibm.biz/JoinIBMVIPRewards-Security Web at “Copyright and trademark information” at
http://www.ibm.com/legal/copytrade.shtml.
youtube/user/IBMSecuritySupport
All names and references for organizations and other business institutions used in this
@AskIBMSecurity deliverable’s scenarios are fictional. Any match with real organizations or institutions is
coincidental.
ibm.biz/IBMSecurityClientSuccess-LinkedIn Statement of Good Security Practices: IT system security involves protecting systems and
information through prevention, detection and response to improper access from within
securityintelligence.com and outside your enterprise. Improper access can result in information being altered,
destroyed, misappropriated or misused or can result in damage to or misuse of your
xforce.ibmcloud.com systems, including for use in attacks on others. No IT system or product should be
considered completely secure and no single product, service or security measure can be
ibm.com/security/community completely effective in preventing improper use or access. IBM systems, products and
services are designed to be part of a lawful, comprehensive security approach, which will
necessarily involve additional operational procedures, and may require other systems,
products or services to be most effective. IBM does not warrant that any systems,
products or services are immune from, or will make your enterprise immune from, the
malicious or illegal conduct of any party.