Set up secure LDAP over SSL (LDAPS)
Kun slutbruger-hjælpen er for tiden oversat til dansk. Hjælp til installation og administration af Zylinc-løsninger er for tiden på engelsk.
Dette emne er fortrinsvis for administratorer og/eller folk som bestyrer en Zylinc-løsning
If your organization uses Active Directory integration with synchronization and single sign-on via LDAP (Lightweight Directory Access Protocol), you can make the LDAP directory synchronization and the authentication secure by using SSL. This type of secure LDAP is also known as LDAPS.
To use LDAPS, you'll need a certificate on your Zylinc solution for secure access to the LDAP server.
The process for setting up LDAPS on your Zylinc system differs depending on which method you want to use for authentication: Zylinc Identity Server or Zylinc Authentication Server.
If you're in doubt, we recommended that you use the Identity Server.

To use LDAPS, you'll need a certificate on your Zylinc solution's Windows Application Server that the Windows Application Server can use for secure access to the LDAP server.
To learn more about requirements for the certificate, and how to set it up with Active Directory Certificate Services, search microsoft.com for Setup LDAPS (LDAP over SSL) or similar. Some of Microsoft's step-by-step descriptions are very useful, especially the one called Step by Step Guide to Setup LDAPS on Windows Server.
If your Zylinc solution is not on the Active Directory domain, or on a different domain, you must manually import the certificate from Active Directory.
When you have your certificate in place, you can enable secure LDAP authentication (LDAPS) in the ZylincAdministration Portal:
-
In the Zylinc Administration Portal menu, select SYSTEM > Interface Configuration, and scroll down to the Authentication section.
-
Select Use Identity Server, and then specify the Identity Server URL.
Example: https://autoconf.example.org:9930/ids
-
In LDAP Url, specify the URL of your LDAP server/Domain Controller.
Because you want to use LDAPS, you should specify ldaps (not just ldap) as the protocol at the beginning of the URL. You should also include the port number 636 in the URL. With port 636, the systems will negotiate SSL before they exchange any LDAP traffic (if you don't include a port number, the Zylinc solution will automatically use the regular LDAP port 389, and we want to avoid that).
Examples:
ldaps://ldaps.example.org:636/
ldaps://ldaps.example.org:636/ou=People,dc=org (where the URL includes directories for limiting the user search to specific LDAP branches) -
If users want to log in to a Zylinc portal, such as the Administration Portal or the Statistics Portal, they may not be able to use their user names to log in directly with LDAPS. In such scenarios, you can use an LDAP System User.
If you define an LDAP system user, the Zylinc solution will use the LDAP system user information to create an LDAPS connection and then retrieve the LDAP-defined user name of the user who attempts to login.
If you don't define an LDAP system user, the Zylinc solution will only use the user-supplied login credentials to authorize the user.
To define an LDAP system user, specify the User Principal Name or SamAccountName of the required system user.
Examples: admin@domain.local (user principal name) domain\admin-svc (samaccountname)
Then specify that system user's Password.
-
By default, authentication will be in plain text. However, you can also use authentication with MD5 (a one-way cryptographic hashing algorithm that works as a checksum by accepting input of any length and returning a fixed-length digest value that's then used to authenticate the original input).
To use MD5, select Enable MD5 Authentication.
-
In Authenticate using, select which value to use when authenticating users:
- DN (Distinguished Name)
- SamAccountName
- Click Save.

To get secure access to the LDAP server with LDAPS, you'll need a Certificate Authority (CA) certificate on your Zylinc solution's Authentication Server that refers to the certificate that you've installed on the LDAP/Active Directory server.
To learn more about requirements for the certificate, and how to set it up with Active Directory Certificate Services, search microsoft.com for Setup LDAPS (LDAP over SSL) or similar. Some of Microsoft's step-by-step descriptions are very useful, especially the one called Step by Step Guide to Setup LDAPS on Windows Server.
When you have your CA certificate, you must add it to the JVM keystore on the Zylinc Authentication Server.

The Zylinc Authentication Server runs on Tomcat, which is a Java-based web server. Tomcat in turn runs on Java Virtual Machine (JVM), so when you're going to add a CA certificate to the Authentication Server, you're technically going to add it to the JVM keystore (the place where JVM stores certificates).
-
On the computer that runs your Zylinc Authentication Server, open a command prompt as administrator, and go to C:\Program Files\Java\[version]\bin
Example: C:\Program Files\Java\jre1.8.0_171\bin
-
Run keytool.exe
-
Run keytool -list -v -keystore "C:\Program Files\Java\jre1.8.0_171\lib\security\cacerts" | findstr "Alias" (if you use another Java version, make sure to use your version number in the string in this and the following steps).
When you get asked for a default password, just press ENTER.
-
You can now view a list of all CA certificates that are available in your JVM keystore.
- If the required CA certificate is already there, you can go to Set up LDAPS in Zylinc Administration Portal.
- If the required CA certificate isn't there, for example because it's a non-public domain certificate, do the following.

-
On the computer where you store the required CA certificate, open Certificate Manager (type crtmgr.msc in Windows' search field, and press ENTER).
-
In Certificate Manager, expand Trusted Root Certification Authorities > Certificates.
-
Right-click the domain CA certificate, and select All Tasks > Export ...
-
Click Next, and select DER encoded binary X.509 (.CER). Then click Next.
-
Select required location and name for the certificate (.cer) file export.
Example: C:\Users\administrator\Desktop\Certs\dmz-ad-ca_20211014.cer
- Click Next, Finish, and OK.

-
On the computer that runs your Zylinc Authentication Server, open a command prompt as administrator, and run the following:
In the following we assume that certificate export from the previous step is placed in C:\Users\administrator\Desktop\Certs\, and that it's called dmz-ad-ca_20211014.cer. You should change the location and name so that it reflects your actual export.
keytool -import -trustcacerts -file "C:\Users\administrator\Desktop\Certs\dmz-ad-ca_20211014.cer" -alias "dmz-ca" -keystore "C:\Program Files\Java\jre1.8.0_171\lib\security\cacerts" -storepass changeit
You've now imported the CA certificate, but its password is changeit, and you should change that to a password of your choice:
-
In the command prompt, run the following:
keytool -storepasswd -keystore "C:\Program Files\Java\jdk1.8.0_171\jre\lib\security\cacerts"
When you're asked for the keystore password, enter changeit
Then enter and confirm your new keystore password.
-
Restart Tomcat to make the changes take effect.

When you have your certificate in place in the Authentication Server's JVM keystore, you can enable secure LDAP authentication (LDAPS) in the ZylincAdministration Portal:
-
In the Zylinc Administration Portal menu, select SYSTEM > Interface Configuration, and scroll down to the Authentication section.
-
Select Use Zylinc AuthServer, and then specify the Authentication Server URL.
Example: http://10.10.10.51:8580/Authentication
-
In LDAP Url, specify the URL of your LDAP server/Domain Controller.
Because you want to use LDAPS, you should specify ldaps (not just ldap) as the protocol at the beginning of the URL. You should also include the port number 636 in the URL. With port 636, the systems will negotiate SSL before they exchange any LDAP traffic (if you don't include a port number, the Zylinc solution will automatically use the regular LDAP port 389, and we want to avoid that).
Examples:
ldaps://ldaps.example.org:636/
ldaps://ldaps.example.org:636/ou=People,dc=org (where the URL includes directories for limiting the user search to specific LDAP branches) -
If users want to log in to a Zylinc portal, such as the Administration Portal or the Statistics Portal, they may not be able to use their user names to log in directly with LDAPS. In such scenarios, you can use an LDAP System User.
If you define an LDAP system user, the Zylinc solution will use the LDAP system user information to create an LDAPS connection and then retrieve the LDAP-defined user name of the user who attempts to login.
If you don't define an LDAP system user, the Zylinc solution will only use the user-supplied login credentials to authorize the user.
To define an LDAP system user, specify the User Principal Name or SamAccountName of the required system user.
Examples: admin@domain.local (user principal name) domain\admin-svc (samaccountname)
Then specify that system user's Password.
-
By default, authentication will be in plain text. However, you can also use authentication with MD5 (a one-way cryptographic hashing algorithm that works as a checksum by accepting input of any length and returning a fixed-length digest value that's then used to authenticate the original input).
To use MD5, select Enable MD5 Authentication.
-
In Authenticate using, select which value to use when authenticating users:
- DN (Distinguished Name)
- SamAccountName
- Click Save.
Dette er hjælp til Zylinc version 6.5. Du kan vælge hjælp til andre versioner her.
© 2021 Zylinc A/S • Ansvarsfraskrivelse
Zylinc unified help har vundet UK Technical Communication Awards
Hjælpeversion: 24 februar 2021 15:41:38
Del denne side med andre: