I am trying to configure SLDAP and I am running into some issues with simply configuring the NSS Tools from Mozilla based on their documentation. Has anyone configured SLDAP before and if so, I am looking for better documentation for configuring this...our environment is 7.6.04 on windows 2008 64 bit server with a SQL 64bit db
Here is the doc I am working from: -------------------------------------------------------------------------------------------------------------------------- Troubleshooting SSL with Certutil (updated 03/23/11-DR) This document contains steps that have been used to configure SSL for use with the Remedy AREA and ARDBC LDAP plugins. Most of the information in this document is supported by the individual 3rd party vendors, not BMC, but has been provided as a convenience to the customer. These steps were written from a Windows Server perspective but should be applicable, with some interpretation, to most Unix platforms. -Certutil Documentation http://www.mozilla.org/projects/security/pki/nss/tools/certutil.html -Certutil Related Libraries and Executables For ARServer 7.5 and greater use: ftp://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_11_RTM/ For ARServer pre-7.5 use ftp://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_4_2_RTM/ A. To export a certificate from Active Directories for use with AR System: 1. From the Active Directory Controller, open the Certificates Console a. Run mmc b. Add Certificates Snap-In, local computer c. Locate the server certificate 2. Right-click on the certificate you would like to export, choose All Tasks, Export 3. From the Export Wizard, choose Base 64 X.509 (.cer) file and save it to the hard drive on the ARServer box. We will refer to this folder as “c:\cert” B. To generate a certificate that can be used by AR System for LDAP 1. Obtain the CERTUTIL utility from Mozilla a. Notes i. The standard Microsoft Windows CertUtil will not work since the AR System used Sun LDAP libraries ii. There will be four files from seamonkey that will be in place in the nss bin directory, libplc4.dll, libplds4.dll, libnspr4.dll, and nspr4.dll b. Use FTP to connect and download the following files (use the correct location for your particular Operating System) i. ftp://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_11_RTM/WINNT5.0_OPT.OBJ/ ii. ftp://ftp.mozilla.org/pub/mozilla.org/seamonkey/releases/1.0.5/seamonkey-1.0.5.en-US.win32.zip iii. c. Unzip the nss-3.11.zip into a folder on the server called c:\nss-3.11 d. Open the seamonkey-1.0.5.en-us.win32.zip and extract the plc4.dll, nspr4.dll, and plds4.dll files, place these in the c:\nss-3.11\bin directory on the server. e. Create a copy of “nspr4.dll” and name it “libnspr4.dll” f. Rename “plc4.dll” to “libplc4.dll” Rename “plds4.dll” to “libplds4.dll” 2. Create the cert7.db or cert8.db file a. Create a folder called “c:\cert” (unless it was already created) b. Open a command window and change directories to “c:\nss-3.4.2\bin” c. Create the certificate store i. Certutil –N –d “c:\cert” 1. This creates the cert7.db file or cert8.db file depending on the version of certutil 2. –N is for new certificate and key database 3. –d specified the folder to locate the cert7.db file d. Add the certificate to the store i. Certutil –A –n certname –t “PTCu,P,P” –d “c:\cert” –a –i “exported cert file” For example: certutil -A -n astro -t "PTCu,P,P" -d "c:\cert" -a -i "c:\cert\astrocert1.cer" 1. This adds the exported certificate to the store 2 –A is to add the certificate 3. –n is the nick name for the certificate (to be used later) 4. –t is the trust, Trusted, peer, Trusted CA to issue server and client certs, used for authentication 5. –d is the cert store location 6. –a is to use ASCII format 7. –i is the certificate file to import e. Validate the certificate i. Certutil –L –d “c:\cert” –n “certname” For example: certutil -L -d "c:\cert" -n "astro" 1. –L is to display information about certificate 2. –d is store location 3. –n is nickname for certificate (entered above) Example output: Certificate: Data: Version: 3 (0x2) Serial Number: 5e:c9:54:50:18:2a:bf:a5:43:17:25:6a:ff:3a:47:fa Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: CN=Astro CA, OU=Support, O=Remedy, L=Pleasanton, ST=CA, C=US, E= [email protected] Validity: Not Before: Thu Mar 25 20:50:35 2004 Not After: Sat Mar 25 20:50:35 2006 Subject: CN=Astro CA, OU=Support, O=Remedy, L=Pleasanton, ST=CA, C=US, E [email protected] Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 00:c3:8e:64:71:be:d6:cb:5c:59:7f:4b:83:48:18: ff:b1:2c:ee:fe:a5:fe:45:55:12:91:21:4f:f2:10: 99:21:d3:78:c4:2c:de:33:b7:2b:cf:b5:0e:a5:82: 43:ee:21:ab:a8:cc:bb:4b:4f:3f:61:94:c8:c5:55: 0b:ad:ae:4e:87 Exponent: 65537 (0x10001) Signed Extensions: Name: 2b:06:01:04:01:82:37:14:02 Data: "" Name: Certificate Key Usage Data: 03:02:01:46 Name: Certificate Basic Constraints Critical: True Data: Is a CA with a maximum path length of -2. Name: Certificate Subject Key ID Data: 04:14:20:a1:e7:b8:9e:e7:f7:49:22:fb:47:b6:fd:c5: e3:20:fa:67:6d:e3 Name: CRL Distribution Points Data: Sequence { Sequence { Option 0 bf:a0:81:bc:86:81:b9:6c:64:61:70:3a:2f:2f: 2f:43:4e:3d:41:73:74:72:6f:25:32:30:43:41: 2c:43:4e:3d:61:73:74:72:6f:2c:43:4e:3d:43: 44:50:2c:43:4e:3d:50:75:62:6c:69:63:25:32: 30:4b:65:79:25:32:30:53:65:72:76:69:63:65: 73:2c:43:4e:3d:53:65:72:76:69:63:65:73:2c: 43:4e:3d:43:6f:6e:66:69:67:75:72:61:74:69: 6f:6e:2c:44:43:3d:6a:65:74:73:6f:6e:73:2c: 44:43:3d:72:65:6d:65:64:79:2c:44:43:3d:63: 6f:6d:3f:63:65:72:74:69:66:69:63:61:74:65: 52:65:76:6f:63:61:74:69:6f:6e:4c:69:73:74: 3f:62:61:73:65:3f:6f:62:6a:65:63:74:63:6c: 61:73:73:3d:63:52:4c:44:69:73:74:72:69:62: 75:74:69:6f:6e:50:6f:69:6e } 74:30:3f:a0:3d:a0:3b:86:39:68:74:74:70:3a:2f:2f: 61:73:74:72:6f:2e:6a:65:74:73:6f:6e:73:2e:72:65: 6d:65:64:79:2e:63:6f:6d:2f:43:65:72:74:45:6e:72: 6f:6c 6c:2f:41:73:74:72:6f:25:32:30:43:41:2e:63:72:6c l/Astro%20CA.crl } Name: 2b:06:01:04:01:82:37:15:01 Data: 131328 (0x20100) Fingerprint (MD5): D4:1D:8C:D9:8F:00:B2:04:E9:80:09:98:EC:F8:42:7E Fingerprint (SHA1): DA:39:A3:EE:5E:6B:4B:0D:32:55:BF:EF:95:60:18:90:AF:D8:07:09 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 77:41:b6:79:ab:1f:77:5a:60:77:bb:65:ac:05:77:f3:5e:29: 76:4c:68:35:e0:8f:62:86:f0:9c:e0:bb:80:b7:b0:85:89:c2: 5b:6d:76:96:40:51:fc:0e:f8:75:61:77:33:a1:e6:2a:83:2a: b6:ab:29:3f:93:2d:04:6b:13:19 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid Peer Trusted Object Signing Flags: Valid Peer Trusted C. In the AREA LDAP Configuration Form, make sure to enable SSL flag to “Yes” and provide the directory name in the certificate database location field. Do not pass the name of the cert store (cert7.db or cert8.db) D. If the key does not work, try the following: 1. Open the Netscape Browser v 4.79 on the ARServer system and connect to: https:\\<ldap server>\ 2. When asked, choose to accept the certificate E. Diagnostic Information 1. To obtain more detailed information from the SSL communication between the AREA or ARDBC LDAP plugin and the LDAP host, you can use the SSLTRACE and SSLDEBUG environment variables to send Debug output to the command prompt (standard out). 2. Follow these steps to run the plugin server from a command prompt so that the Standard Out information will be visible. a. Edit armonitor.cfg and comment out the arplugin.exe line by prefixing it with a hash sign (#) b. Restart the AR System server service so that the plugin server is not longer running c. Open a command prompt to the folder where arserver.exe and arplugin.exe reside d. Set 2 environment variables: SET SSLDEBUG=1 SET SSLTRACE=3 e. Launch arplugin.exe from the command line: Arplugin –i . –m (This is the minimal syntax and assumes that the CONF folder containing ar.cfg is in the current directory) f. Enable Plugin logging and set the Plugin-Log-Level: to 100 or All g. Perform some steps using the Remedy clients that would cause an LDAP connection, using SSL, to take place. h. If an actual SSL connection was being made to the LDAP host, the command prompt should contain some diagnostic information including an error number. This error may be used by your SSL admins to troubleshoot the problem. In some cases, a descriptive error message is provided as well. i. When communicating with BMC Support, please include the Plugin log, the diagnostic output and , if possible, the output from certutil showing the validated certificate: Certutil –L –d “c:\cert” –n “certname” _______________________________________________________________________________ UNSUBSCRIBE or access ARSlist Archives at www.arslist.org attend wwrug12 www.wwrug12.com ARSList: "Where the Answers Are"

