
NOTE: If you are using a load-balanced (round robin) solution for your directory server,
obtain the FQDN of one node in the server by entering the following commands.
nslookup <directory-server-FQDN>
A list of IP addresses is returned. Select one IP address and enter:
nslookup <directory-server-IP address>
Enter the FQDN returned for this IP address as the <directory-server-FQDN> in the
openssl command above.
3. Edit ldapserver.pem and remove all lines except for the contents of the certificate, and the
Begin Certificate and End Certificate lines.
Keep all certificates in the file so that you include the entire chain. If your certificate chain has
more than one CA, all CAs must be included. Make sure there are no blank lines or white
space.
Example ldapserver.pem file after editing:
-----BEGIN CERTIFICATE-----
M123DTCCAvWgAwIBAgIJANgTCE…
IFl1P+c9Gro82S7z
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIIEDTCCAvWgAwIBAgIJANgTCE…
IFl1P+c9Gro82S7z
-----END CERTIFICATE-----
4. Replace the old ldapserver.pem certificate file with the new file using the following
commands:
sudo mv /ci/data/keystone/ldapserver.pem /ci/data/keystone/ldapserver.pem.old
sudo mv ldapserver.pem /ci/data/keystone/ldapserver.pem
sudo chown trm1:keystone /ci/data/keystone/ldapserver.pem
sudo chmod 640 /ci/data/keystone/ldapserver.pem
5. Edit /etc/keystone/keystone.conf and delete the line tls_req_cert = allow.
sudo sed -i "s/tls_req_cert = allow//g" /etc/keystone/keystone.conf
6. Restart the OpenStack-Keystone service.
sudo service openstack-keystone restart
Using Active Directory
Procedure 84 Enabling strong certificate validation if your directory service is Active Directory
1. Export the Certificate Authority (CA) certificate to a file by entering the following command
where Active Directory Certificate Services is running:
certutil -ca.cert CA.cer > ca.pem
2. Copy the ca.pem file to an internal Secure FTP (SFTP) server. Use TEXT as the transfer mode.
3. Log in to the CloudSystem Foundation base appliance console. See Using the CloudSystem
appliances console (page 199).
4. Get the exported ca.pem file from the internal SFTP server.
5. Get the Active Directory server certificate.
sudo openssl s_client -showcerts -host <directory-server-FQDN> -port
636 > ad.pem
190 Enabling strong certificate validation in the CloudSystem Portal
Comentários a estes Manuais