CA Single Sign-On Tech Tip by Sau Lai Wong, Senior Support Engineer for 11th August 2016
Administrative UI/ application server is installed with an embedded certificate database.
To configure external administrator store connection over SSL, we have to add the Root Certificate Authority to the Administrative UI/ application server’s certificate database.
With the bundled JBOSS, the trust store resides under <adminui>\server\default\conf\ directory. Run the following command to add the Root Certificate Authority to Administrative UI certificate database:
keytool.exe -importcert -trustcacerts -alias <alias> -file <CACertificate> -keystore trustStore.jks -storepass <truststore_password> -v
After the external administrator store connection over SSL is configured successfully, following error is constantly getting logged in the Policy Server log:
[ERROR]SmDsLdapConnMgr Bind. Server host.domain.com : 636. Error 81-Can't contact LDAPserver
Policy Server R12.52 SP1 release onward.
Following policy objects are created automatically once external administrator store configuration is completed successfully:
- AdvAuthExternalRDBDir /AdvAuthExternalLDAPDir – depending if the external admin store is on LDAP or ODBC repository
- AdvAuthNAuthZRealm – protected resource = “/sampleresource.html”
‘AdvAuthExternalLDAPDir’ user directory is created with details gathered during the external administrator store configuration. When SSL is enabled for the external admin store, we need to manually import the Root Certificate Authority and Server certificates to Policy Server’s certificate database, after 'AdvAuthExternalLDAPDir' user directory is created. If this manual step is not done, Policy Server will not be able to connect to the backed LDAP user directory over SSL and log the LDAP error.
Details in adding the certificates, please refer to the following link: