Secure Global Desktop 4.31 Administration Guide > Security > Securing connections to Active Directory and LDAP directory servers
You can use Secure Global Desktop security services to secure the connections to an LDAP directory server, including Microsoft Active Directory. LDAP connections are used with the following authentication mechanisms:
To secure these connections:
tarantella restart
.The configuration required for steps 2 to 5 is described below.
The configuration needed depends on the authentication mechanisms that have been enabled in Array Manager
ad://east.indigo-insurance.com
.
ad://
.ldaps://melbourne.indigo-insurance.com
.
ldaps://
.ldaps://melbourne.indigo-insurance.com:5678
.ldaps://melbourne.indigo-insurance.com/dc=indigo-insurance,dc=com
To be able to use secure connections, Secure Global Desktop must be able to validate the certificate presented by an LDAP directory server or Active Directory. To do this you must import the root certificate (the Certificate Authority's certificate) into the keystore (the cacerts
file) for the Java™ 2 Runtime Environment (JRE) used by the Secure Global Desktop server.
Run the following command:
/opt/tarantella/bin/jre/bin/keytool -import \ -keystore /opt/tarantella/bin/jre/lib/security/cacerts \ -storepass changeit -file root_certificate_path \ -alias alias
Notes:
keytool
application.-alias
option to uniquely identify the certificate.cacerts
file on every member of the array.Microsoft Active Directory will only accept secure connections from servers that have a valid client certificate that has been signed using the Certificate Services on a Windows 2000/2003 Server. You must create and install a client certificate for each member of the array.
You create and install server client certificates with the keytool
application, see the Java 2 SDK Tools and Utilities documentation for details.
Server client certificates are stored in the Secure Global Desktop certificate store /opt/tarantella/var/info/certs/sslkeystore
.
You must provide a password when adding or removing certificates from the certifcate store. The password for the sslkeystore
is unique to each Secure Global Desktop server and can be found in the /opt/tarantella/var/info/key
file. Use this password for both the -storepass
and -keypass
options.
To create and install client certificates:
Run the following command to generate the key pair for the client certificate:
/opt/tarantella/bin/jre/bin/keytool -genkey \ -keyalg rsa \ -keystore /opt/tarantella/var/info/certs/sslkeystore \ -storepass password \ -alias alias \ -keypass password
Run the following command to generate the Certificate Signing Request (CSR) for the client certificate:
/opt/tarantella/bin/jre/bin/keytool -certreq \ -keystore /opt/tarantella/var/info/certs/sslkeystore \ -storepass server_password \ -alias alias \ -keypass server_password -file path_to_CSR
The alias must be the same as the alias used when generating the key pair. Aliases are case-insensitive.
http://Windows_server/certsrv
.Run the following command to install the client certificate for a Secure Global Desktop server:
/opt/tarantella/bin/jre/bin/keytool -import \ -file certificate_path \ -keystore /opt/tarantella/var/info/certs/sslkeystore \ -storepass server_password \ -alias alias \ -keypass server_password
For the Active Directory login authority, you must enable LDAP signing on your domain controllers. For example:
Copyright © 1997-2007 Sun Microsystems, Inc. All rights reserved.