Hello Onkar,

I ran into a similar issue when connecting to a Red Hat LDAP server, using UID, 
and not a MS Exchange server, since that is what the sAMAccountName is used 
for. I used the following settings to make the ARDBC LDAP connection:

Host Name: ldap.host.com
Port Number: 636
Bind User: uid=ldapuser,ou=service,dc=host,dc=com
Bind Password: <password>
Use Secure Socket Layer: Yes
Certificate Database: <Path to java keystore; e.x. C:\LDAP\ldaptrust.jks>
LDAP Date-Time Format: Generalized Time
Failover Timeout: 3000
Directory Page Size: 1000
Base DN for Discovery: ou=people,dc=host,dc=com

If you are not using SSL, this will make things much, much easier. Your default 
port for non-SSL is 389. If you are using SSL, ensure you have created your 
Java Keystore using the following command:

Create the Cert Database:
certutil -N -d <certDir>
Import the certs into the
keytool -import -noprompt -trustcacerts -keystore <PATH TO JavaKeyStore; i.e. 
C:\JKS\javakeystore.jks> -storepass <Password for JKS file> -alias <Provide an 
alias> -file <PATH TO Certificate file; i.e. C:\CERT\certificate.crt>

There is a good bit of information on the Java Keystore in the AR System 8.1 
documentation

I hope this helps.

Kevin Eldridge

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
"Where the Answers Are, and have been for 20 years"

Reply via email to