
Setting up Certificate-Based Authentication
361
certificate databases only for the Directory Server instance called
instance_name
. That directory
will not contain key and certificate databases for any other server or client, nor will any of the key,
certificate, or other security-related files for
instance_name
be located in any other directory.
NOTE
The Directory Server 8.0 no longer uses separate files for the key and certificate
databases. With the Filesystem Hierarchy Standard, the certificate and key files have
been consolidated into a single file, specified in the
nsslapd-certdir
parameter, and
the key and certificate file is stored in the
/etc/dirsrv/slapd-
instance_name
directory.
Previous versions of Directory Server used a single directory,
/opt/redhat-ds/slapd-
instance/alias
, for all security-related files for all servers, and required a unique
prefix, such as
slapd-instance-
, for the key, certificate, and security-related files. The
Directory Server used the attributes
nsCertFile
and
nsKeyFile
to give the locations
for the key and certificate databases.
11.6.1. Setting up Certificate-Based Authentication
To set up certificate-based authentication, do the following:
1. Create a certificate database for the client and the server or for both servers involved in
replication.
In the Directory Server, the certificate database creation automatically takes place when
a certificate is installed. For information on creating a certificate database for a client, see
Section 11.7, “Configuring LDAP Clients to Use SSL”
.
2. Obtain and install a certificate on both the client and the server or on both servers involved in
replication.
3. Enable TLS/SSL on the server or on both servers involved in replication.
For information on enabling TLS/SSL, refer to
Section 11.4, “Starting the Server with TLS/SSL
Enabled”
.
NOTE
If the Red Hat Console connects to Directory Server over TLS/SSL, selecting
Require client authentication
disables communication. This is because, although
Red Hat Console supports TLS/SSL, it does not have a certificate to use for client
authentication.
4. Map the certificate's distinguished name to a distinguished name known by the directory.
This can set access control for the client when it binds using this certificate.
Содержание DIRECTORY SERVER 8.0
Страница 18: ...xviii ...
Страница 29: ...Configuring the Directory Manager 11 6 Enter the new password and confirm it 7 Click Save ...
Страница 30: ...12 ...
Страница 112: ...94 ...
Страница 128: ...110 ...
Страница 190: ...Chapter 6 Managing Access Control 172 4 Click New to open the Access Control Editor ...
Страница 224: ...206 ...
Страница 324: ...306 ...
Страница 334: ...316 ...
Страница 358: ...340 ...
Страница 410: ...392 ...
Страница 420: ...402 ...
Страница 444: ...426 ...
Страница 454: ...436 ...
Страница 464: ...446 ...
Страница 484: ...466 ...
Страница 512: ...494 ...
Страница 522: ...504 ...