Secure Global Desktop 4.40 Administration Guide > Security > Securing Connections to Active Directory and LDAP Directory Servers
You can use SGD security services to secure the connections to an LDAP directory server, including Microsoft Active Directory. These connections are used with the following authentication mechanisms:
To secure these connections:
For instructions, see either Active Directory Authentication or LDAP Authentication. For Third-party authentication, see Web Server Authentication.
To be able to use secure connections, SGD must be able to validate the certificate presented by an LDAP directory server or Active Directory.
You must import the root certificate for every Active Directory or LDAP directory server you are using with SGD
into the cacerts
file on every SGD server in the array. See Importing Root Certificates for details.
See Creating Client Certificates for Use With Active Directory Authentication for details.
Log in as superuser (root) on the SGD host.
# tarantella security start tarantella restart
To be able to use secure connections, SGD must be able to validate the certificate presented by an LDAP directory server or Active Directory.
To do this you must import the root certificate (the Certificate Authority's certificate) into the keystore (the cacerts
file) for the Java™ 2
Runtime Environment (JRE) used by the SGD server.
Use the following command:
/opt/tarantella/bin/jre/bin/keytool -import \ -keystore /opt/tarantella/bin/jre/lib/security/cacerts \ -storepass changeit \ -file root_certificate_path \ -alias alias
Note the following:
keytool
application.-alias
option to uniquely identify the certificate.cacerts
file on every SGD server in the array.Microsoft Active Directory only accepts secure connections from servers that have a valid client certificate that has been signed using the Certificate Services on a Windows 2000/2003 Server. You must create and install a client certificate for each SGD server in the array.
You create and install server client certificates with the keytool
application, see the Java 2 SDK Tools and Utilities documentation for details.
Server client certificates are stored in the SGD certificate store /opt/tarantella/var/info/certs/sslkeystore
.
You must provide a password when adding or removing certificates from the certificate store.
The password for the sslkeystore
is unique to each SGD server and can be found in the
/opt/tarantella/var/info/key
file. Use this password for both the -storepass
and -keypass
options.
To create and install a client certificate for an SGD server:
# /opt/tarantella/bin/jre/bin/keytool -genkey \ -keyalg rsa \ -keystore /opt/tarantella/var/info/certs/sslkeystore \ -storepass "$(cat /opt/tarantella/var/info/key)" \ -alias alias \ -keypass "$(cat /opt/tarantella/var/info/key)"
# /opt/tarantella/bin/jre/bin/keytool -certreq \ -keystore /opt/tarantella/var/info/certs/sslkeystore \ -storepass "$(cat /opt/tarantella/var/info/key)" \ -alias alias \ -keypass "$(cat /opt/tarantella/var/info/key)" \ -file path_to_CSR
The alias must be the same as the alias used when generating the key pair. Aliases are case-insensitive.
http://Windows_server/certsrv
.# /opt/tarantella/bin/jre/bin/keytool -import \ -file certificate_path \ -keystore /opt/tarantella/var/info/certs/sslkeystore \ -storepass "$(cat /opt/tarantella/var/info/key)" \ -alias alias \ -keypass "$(cat /opt/tarantella/var/info/key)"
For Active Directory authentication, once you have installed client certificates for all the SGD servers in the array, you must enable LDAP signing on your domain controllers. For example, you do this as follows:
Copyright © 1997-2007 Sun Microsystems, Inc. All rights reserved.