Hey,
thanks everyone. I think I will try to use a wildcard certificate
I will use a common name for my LDAP server and I won't use DNS round robin or intelligent name server. And I think my client will handle fail-over internally and connect directly to each server.

Julien Courtès

Le 12/03/2014 17:53, Jon C Kidder a écrit :
The methods you use to successfully complete a TLS handshake are completely dependent 
upon the methods you choose to implement "fail-over" to your second LDAP 
server.  Will you be using a common name and virtual IP? Will you be using a common 
virtual name (DNS round robin or intelligent name server)? Will your client handle 
fail-over internally and connect directly to each server?

Once we have the details around your fail-over solution we can provide more 
advice on methods for handling the host name validation portion of your TLS 
handshake.

-Jon C. Kidder
American Electric Power
Middleware Services
Email: [email protected]
Phone: 614-716-4970

-----Original Message-----
From: [email protected] 
[mailto:[email protected]] On Behalf Of Julien Courtès
Sent: Wednesday, March 12, 2014 11:58 AM
To: [email protected]
Subject: TLS with multiple LDAP servers

  This is an EXTERNAL email. STOP. THINK before you CLICK links or OPEN 
attachments.

**********************************************************************
Hi,
I have two LDAP servers in master-slave
ldap1.domain.com - master
ldap2.domain.com - slave
These servers got different ip addresses and are hosted on different servers 
But I want to enable TLS connection with clients.
So can I create a unique certificate that I put on both servers and the client will use one unique 
certificate to connect to server "ldap1" or "ldap2" if the first one is down.

If not, how should I do?
I did a search and I found that I can use subjectAltNames or wildcard 
certificat.

Thanks

Julien Courtès




Reply via email to