O'Reilly logo

LDAP Implementation Cookbook by Permana Widhiasta, Harri Stranden, Michel Melot, Heinz Johner

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

5.4. Configuring SSL Security

This section describes the procedures required to set up SSL security. To enable security with server authentication, you must do one of the following:

  • Create a certificate signed by a well-known certificate authority (CA)

    Create a public/private key pair and obtain and store a certificate from one of the predefined (well-known) Certificate Authorities. This procedure requires less setup because the keyring file is preconfigured with the CA root certificates required to identify the CAs from whom the certificate is issued.

  • Create a self-signed certificate

    The process of applying for and receiving a certificate from a CA can take two to three weeks. To enable SSL security until you receive the required CA root and server ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required