summaryrefslogtreecommitdiff
path: root/docs/Samba3-HOWTO/TOSHARG-SecureLDAP.xml
diff options
context:
space:
mode:
authorJohn Terpstra <jht@samba.org>2005-06-29 07:52:24 +0000
committerGerald W. Carter <jerry@samba.org>2008-04-23 08:46:57 -0500
commit6713e84bba2c49ab2a199e23b85a63dc7bf477c6 (patch)
tree9d540949483a186198da92a1a4945e08f80eae37 /docs/Samba3-HOWTO/TOSHARG-SecureLDAP.xml
parentc5ae3a64863842960f42589a5ddc07755b4f6316 (diff)
downloadsamba-6713e84bba2c49ab2a199e23b85a63dc7bf477c6.tar.gz
samba-6713e84bba2c49ab2a199e23b85a63dc7bf477c6.tar.bz2
samba-6713e84bba2c49ab2a199e23b85a63dc7bf477c6.zip
Updates.
(This used to be commit 06167ba9122d52bcd07b2ceb0e73e013c28ad309)
Diffstat (limited to 'docs/Samba3-HOWTO/TOSHARG-SecureLDAP.xml')
-rw-r--r--docs/Samba3-HOWTO/TOSHARG-SecureLDAP.xml13
1 files changed, 11 insertions, 2 deletions
diff --git a/docs/Samba3-HOWTO/TOSHARG-SecureLDAP.xml b/docs/Samba3-HOWTO/TOSHARG-SecureLDAP.xml
index a288167ea2..6a3aa33bba 100644
--- a/docs/Samba3-HOWTO/TOSHARG-SecureLDAP.xml
+++ b/docs/Samba3-HOWTO/TOSHARG-SecureLDAP.xml
@@ -8,6 +8,7 @@
<para>
<indexterm><primary>Transport Layer Seccurity, TLS</primary><secondary>Introduction</secondary></indexterm>
+<indexterm><primary>ACL</primary></indexterm>
Up until now, we have discussed the straight forward configuration of <trademark>OpenLDAP</trademark>,
with some advanced features such as ACLs. This does not however, deal with the fact that the network
transmissions are still in plain text. This is where <firstterm>Transport Layer Security (TLS)</firstterm>
@@ -15,18 +16,23 @@
</para>
<para>
+<indexterm><primary>RFC 2830</primary></indexterm>
<trademark>OpenLDAP</trademark> clients and servers are capable of using the Transport Layer Security (TLS)
framework to provide integrity and confidentiality protections in accordance with - <ulink
- url="http://rfc.net/rfc2830.html">RFC2830</ulink>; <emphasis>Lightweight Directory Access Protocol (v3):
+ url="http://rfc.net/rfc2830.html">RFC 2830</ulink>; <emphasis>Lightweight Directory Access Protocol (v3):
Extension for Transport Layer Security.</emphasis>
</para>
<para>
+<indexterm><primary>X.509 certificates</primary></indexterm>
TLS uses X.509 certificates. All servers are required to have valid certificates, whereas client certificates
are optional. We will only be discussing server certificates.
</para>
<tip><para>
+<indexterm><primary>DN</primary></indexterm>
+<indexterm><primary>CN</primary></indexterm>
+<indexterm><primary>FQDN</primary></indexterm>
The DN of a server certificate must use the CN attribute to name the server, and the CN must carry the
server's fully qualified domain name (FQDN). Additional alias names and wildcards may be present in the
<option>subjectAltName</option> certificate extension. More details on server certificate names are in <ulink
@@ -51,6 +57,7 @@
<title>Generating the Certificate Authority</title>
<para>
+<indexterm><primary>Certificate Authority</primary><see>CA</see></indexterm>
In order to create the relevant certificates, we need to become our own Certificate Authority (CA).
<footnote><para>We could however, get our generated server certificate signed by proper CAs, like <ulink
url="http://www.thawte.com/">Thawte</ulink> and <ulink url="http://www.verisign.com/">VeriSign</ulink>, which
@@ -59,6 +66,7 @@
</para>
<para>
+<indexterm><primary>OpenSSL</primary></indexterm>
We will be using the <ulink url="http://www.openssl.org">OpenSSL</ulink> <footnote><para>The downside to
making our own CA, is that the certificate is not automatically recognised by clients, like the commercial
ones are.</para></footnote> software for this, which is included with every great <trademark
@@ -233,7 +241,8 @@ X509v3 extensions:
F7:84:87:25:C4:E8:46:6D:0F:47:27:91:F0:16:E0:86:6A:EE:A3:CE
X509v3 Authority Key Identifier:
keyid:27:44:63:3A:CB:09:DC:B1:FF:32:CC:93:23:A4:F1:B4:D5:F0:7E:CC
- DirName:/C=AU/ST=NSW/L=Sydney/O=Abmas/OU=IT/CN=ldap.abmas.biz/emailAddress=support@abmas.biz
+ DirName:/C=AU/ST=NSW/L=Sydney/O=Abmas/OU=IT/
+ CN=ldap.abmas.biz/emailAddress=support@abmas.biz
serial:00
Certificate is to be certified until Mar 6 18:22:26 2006 EDT (365 days)