Setting up your LDAP client to access Directory Server
You can use the steps provided here to create a key database file for an LDAP client that contains one or more self-signed server certificates that are marked as trusted by the client.
About this task
The process can also be used to import CA certificates
from other sources, such as VeriSign, into the client's key database
file for use as trusted roots. A trusted root is simply an X.509 certificate
signed by a trusted entity (for example VeriSign, or the creator of
a self-signed server certificate), imported into the client's key
database file, and marked as trusted.
- Copy the server's certificate file (cert.arm) to your client workstation.
- Run ikeyman to create a new client key database file or to access an existing one. For a new client key database, choose a file name associated with the client for ease of management. For example, if the LDAP client runs on Fred's machine, you might choose to name the file FRED.KDB.
- If adding a server's certificate to the existing client key database:
- Click Key database file and select Open.
- Enter the path and name of the existing key database file then click OK.
- Enter the password.
- Ensure signer certificates is chosen. Click Add.
- Enter the name and location of the server's certificate file.
- Enter a label for the server certificate entry in the client's key database file, for example, Corporate Directory Server, and then click OK.
- If creating the new Client key database:
- Click Key database file and select New.
- Enter the name and location for the new Client Key DataBase file, and then click OK.
- Enter the password.
- After the new client key database is created, repeat the previous steps for adding the server's certificate to the existing key database file.
- Exit ikeyman.
When the LDAP client creates a secure SSL connection with the server, it uses the server's self-signed certificate to verify that it is connecting to the proper server.
Repeat the preceding steps for each Directory Server that the LDAP client needs to connect to in a secure fashion.