Active Directory Publisher
Publishing to Active Directory
When configuring Active Directory LDAP, the Bind DN for the users is usually:
cn=user,cn=Users,dc=domain-component1,dc=domain-component2For example for the domain primekey.com:
cn=User Usersson,cn=Users,dc=primekey,dc=comIf your DN and your base DN are like the following examples:
cn=Ejbca1,0=MyOrg,c=SEDC=Security,DC=Software,DC=MyOrgThen the publisher for AD should have a base DN like the following example:
cn=Users,dc=Security,dc=Software,dc=MyOrgFor Login DN, use the full LDAP name, for example:
CN=Administrator,CN=Users,dc=primekey,dc=seTo connect to AD though SSL, issue an LDAP SSL P12 to the domain controller, according to MS Article ID 321051.
The same certificate is used for both the AD and global catalogue (GC). Remember to add the CA certificate to the machine that stores trusted root certificates.
To publish a CRL to Active Directory, use a Base DN similar to:
CN=somename,CN=CDP,CN=Public Key Services,CN=Services,CN=Configuration,DC=somemachine,DC=primekey,DC=seThe CRL Distribution Point in the certificate should point to:
ldap:///CN=Test%20MS%20SC%20Logon%20CA%20v1,CN=somename,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=somemachine,DC=primekey,DC=se?certificateRevocationList?base?objectClass=cRLDistributionPointUsing LDAPs
To use LDAPs (LDAP over TLS) when publishing to AD, do the following:
Configure your publisher in EJBCA to use TLS by checking the TLS Connection option, changing the port to port 636.
Since using the LDAP library, the CA certificate of the (root) CA used to sign the AD server certificate must be present in the java certificate trust store ($JAVA_HOME/jre/lib/security/cacerts).
Add a CA certificate to the java trust store using the following command:keytool -import-trustcacert -alias MyCA -keystore $JAVA_HOME/jre/lib/security/cacerts -storepass changeit -file myca.der