solution
This commit is contained in:
19
Readme.md
19
Readme.md
@@ -39,6 +39,8 @@ chgrp -R ldap chgrp ldap /etc/letsencrypt/{archive,live}
|
||||
chmod -R g+rX /etc/letsencrypt/{archive,live}
|
||||
```
|
||||
|
||||
## Configurer le serveur
|
||||
|
||||
```ldif
|
||||
dn: cn=config
|
||||
changetype: modify
|
||||
@@ -61,13 +63,30 @@ olcTLSCertificateKeyFile: /etc/openldap/certs/key.pem
|
||||
#LETsEncrypt: olcTLSCertificateKeyFile: /etc/letsencrypt/live/CHANGEME.formation.opendoor.fr/privkey.pem
|
||||
```
|
||||
|
||||
Le cas échéant on ouvrira le parefeu:
|
||||
|
||||
```bash
|
||||
firewall-cmd --add-service ldaps--permanent
|
||||
firewall-cmd --add-service ldaps
|
||||
```
|
||||
|
||||
## Configurer le client
|
||||
|
||||
dans le fichier /etc/openldap/ldap.conf modifier l'_URI_, _TLS_REQCERT_ et _TLS_CACERT_
|
||||
|
||||
```bash
|
||||
URI ldaps://CHANGEME.formation.opendoor.fr
|
||||
TLS_REQCERT demand
|
||||
TLC_CACERT /etc/openldap/certs/ca.pem
|
||||
```
|
||||
|
||||
## Test
|
||||
|
||||
On doit pouvoir se connecter de manière sécurisé au serveur
|
||||
|
||||
```bash
|
||||
lds -Z
|
||||
```
|
||||
|
||||
Wireshark ne doit voir passer que des paquets TLS 1.3 application_data
|
||||
|
||||
|
||||
Reference in New Issue
Block a user