Changes between Version 29 and Version 30 of ConnectorsSetup
- Timestamp:
- 08/01/13 11:30:19 (11 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
ConnectorsSetup
v29 v30 43 43 (2) Configure the IdP to directly trust these certificates: (2.1) for authN and (2.2) for retrieving attributes from the LDAP directory [these are independent]: 44 44 45 (2.1) Configure the authentication module to trust the AD certificate by adding to the configuration in ''$IDP_HOME''/conf/login.config a line like (per Daniel Fisher <dfisher@vt.edu> 2013-04-24 and 2013-07-30) :45 (2.1) Configure the authentication module to trust the AD certificate by adding to the configuration in ''$IDP_HOME''/conf/login.config a line like (per Daniel Fisher <dfisher@vt.edu> 2013-04-24 and 2013-07-30). The explicitly trusted certificate may be an individual server certificate, a pem file with multiple server certificates, or, in this example, the certificate for the issuing private CA: 46 46 47 {{{48 // UA AD Auth49 edu.vt.middleware.ldap.jaas.LdapLoginModule sufficient50 ldapUrl="ldap://fbk-adua02.ua.ad.alaska.edu:3268"51 baseDn="dc=ua,dc=ad,dc=alaska,dc=edu"52 bindDn="cn=uashib,ou=uaf_service,ou=uaf,dc=ua,dc=ad,dc=alaska,dc=edu"53 bindCredential="••••••••••"54 subtreeSearch="true"55 // Directly reference imported server certificate for TLS on 3268 rather than SSL on 326956 sslSocketFactory="{trustCertificates=file:/opt/shibboleth-idp/trustedservercerts/Fbk-Adua02.ua.ad.alaska.edu.pem}"57 ssl="false"58 tls="true"59 userField="sAMAccountName,uaIdentifier";60 47 61 }}}62 63 For multiple server instances to provide connection fail-over, or simply to avoid importing and maintaining relatively short-lived server certificates, trust the issuing CA's certificate:64 48 {{{ 65 49 … … 69 53 baseDn="dc=ua,dc=ad,dc=alaska,dc=edu" 70 54 bindDn="cn=uashib,ou=uaf_service,ou=uaf,dc=ua,dc=ad,dc=alaska,dc=edu" 71 bindCredential=" lkjhyuio87"55 bindCredential="•••••••••••" 72 56 subtreeSearch="true" 73 57 // Directly reference imported certificate for CA used to create/sign UA AD server certs … … 78 62 79 63 }}} 80 (2.2) Configure the Data Connectors in '$IDP_HOME''/conf/attribute-resolver.xml to use StartTLSTrustCredential. https://wiki.shibboleth.net/confluence/display/SHIB2/ResolverLDAPDataConnector 81 (additional input from Nate Klingenstein <Nate Klingenstein <ndk@internet2.edu> 2013-06-04): 64 (2.2) Configure the Data Connectors in '$IDP_HOME''/conf/attribute-resolver.xml to use StartTLSTrustCredential. 65 66 As for the login configuration, the certificate may be an individual server certificate, or the issuing private CA's certificate. Here we use the same file, so that the IdP has only one copy of the private CA certificate used for both login.config and attribute-resolver.xml 67 68 https://wiki.shibboleth.net/confluence/display/SHIB2/ResolverLDAPDataConnector 69 additional input from Nate Klingenstein <Nate Klingenstein <ndk@internet2.edu> 2013-06-04: 70 82 71 {{{ 83 72 <resolver:DataConnector xsi:type="LDAPDirectory" xmlns="urn:mace:shibboleth:2.0:resolver:dc" 84 85 ldapURL="ldaps://fbk-adua01.ua.ad.alaska.edu:3268"86 87 88 89 73 id="uaADLDAP" 74 ldapURL="ldap://fbk-adua01.ua.ad.alaska.edu:3268" 75 baseDN="ou=useraccounts,dc=ua,dc=ad,dc=alaska,dc=edu" 76 principal="cn=uashib,ou=uaf_service,ou=uaf,dc=ua,dc=ad,dc=alaska,dc=edu" 77 principalCredential="•••••••••••" 78 useStartTLS="true"> 90 79 91 80 <FilterTemplate>....</FilterTemplate> 92 81 93 <StartTLSTrustCredential xsi:type="security:X509 Inline"94 95 96 <security:Certificate>97 <!-- DER or PEM encoded cert -->98 </security:Certificate>82 <StartTLSTrustCredential xsi:type="security:X509Filesystem" 83 xmlns:security="urn:mace:shibboleth:2.0:security" 84 id="UA_AD_CA_Certificate"> 85 <security:Certificate> 86 /opt/shibboleth-idp/trustedservercerts/UA_AD_CA.pem 87 </security:Certificate> 99 88 </StartTLSTrustCredential> 100 89 </resolver:DataConnector> 101 102 <!-- OR -->103 104 <StartTLSTrustCredential xsi:type="security:X509FileSystem"105 xmlns:security="urn:mace:shibboleth:2.0:security"106 id="UA_AD_CA_Certificate">107 <security:Certificate>/opt/shibboleth-idp/trustedservercerts/UA_AD_CA.pem</security:Certificate>108 </StartTLSTrustCredential>109 90 }}} 110 91 === [[IdPSetup|Failover connectors]] ===