Publishing to Active Directory
When configuring Active Directory LDAP, the Bind DN for the users is usually:
For example, for the domain primekey.com:
If your DN and your base DN are like the following examples:
Then the publisher for AD should have a base DN like the following example:
For Login DN, use the full LDAP name, for example:
To connect to AD though SSL, issue an LDAP SSL P12 to the domain controller, according to MS Article ID 321051.
The same certificate is used for both the AD and global catalogue (GC). Remember to add the CA certificate to the machine that stores trusted root certificates.
To publish a CRL to Active Directory, use a Base DN similar to:
CN=somename,CN=CDP,CN=Public Key Services,CN=Services,CN=Configuration,DC=somemachine,DC=primekey,DC=se
The CRL Distribution Point in the certificate should point to:
To use LDAPs (LDAP over TLS) when publishing to AD, do the following:
Configure your publisher in EJBCA to use TLS by checking the TLS Connection option, changing the port to port 636.
Since using the LDAP library, the CA certificate of the (root) CA used to sign the AD server certificate must be present in the java certificate trust store ($JAVA_HOME/jre/lib/security/cacerts).
Add a CA certificate to the java trust store using the following command:
-trustcacert -alias MyCA -keystore $JAVA_HOME/jre/lib/security/cacerts -storepass changeit -file myca.der