To be able to use LDAPS, your client machine (PVE) must trust server's certificate. Sign LDAP server's SSL certificate with some CA (private CA is ok) and place that CA certificate to /usr/local/share/ca-certificates in PEM format with .crt extension on PVE and run `update-ca-certificates` to make system trust it.

21.05.2018 16:03, Marco Gaiarin пишет:
I've tried to setup my AD domain (with samba!) as authentication
source.

It works, but i was not able to setup SSL, and i was forced to disable
'sign or seal' in samba conf, eg:

        ldap server require strong auth = no

In 'Authentication' i've put:

  Realm: LNFFVG
  Domain: AD.FVG.LNF.IT
  Server: <my server>
  Fallback Server: <another server>
  Port: empty
  SSL: is not editable
  TFA: empty/none

if i (un)set Port:, eg keep the default, AND i put 'ldap server require strong 
auth =
no' in smb.conf auth work.

If i set Port: 636, does not work.


Someone have some hint?! Thanks.


_______________________________________________
pve-user mailing list
[email protected]
https://pve.proxmox.com/cgi-bin/mailman/listinfo/pve-user

Reply via email to