PowerStore: Create SSL Certificate from Microsoft certificate authority to enable secure LDAP; LDAPS
摘要:
Enabling LDAPS ( secure LDAP ) Authentication requires importing SSL certificates during the LDAP Configuration with Directory Services settings. The instruction below is only if the
customer is using a Microsoft certificate authority server.
...
Once logged in, on the Windows Server, hit the Windows key + R, which should bring up the "Run" application
If for some weird reason you don't have a Windows key; at the bottom left of the screen you can see the Windows icon, click it
Then, you can start typing in the word "Run" and that should bring up a search panel on the right side of your screen, click on the "Run" application
Once the Run application opens, type in the words "mmc" into the text field right next to the word "Open" and then click on the "OK" button
This should open a fresh Microsoft Common Console Document
At the top left, click on File → Add/Remove Snap-in; this should open an "Add or Remove Snap-ins" window
On the left box titled "Available Snap-ins", the first snap-in to select is "Certificates", once it is highlighted, click the "Add" button in the middle of the window
Next, click on "Computer Account" and click the "Next" button
Then click the "Finish" button
Next, add the "Certification Authority" snap-in, hit the "Add" button, and then click the "Finish" button
Lastly, select "Certificate Templates" snap-in and click the "Add" button
Your "Selected snap-ins" should look like this once you are done
Click "OK"
Now you can save this console, so you don't have to add the snap-ins every time, just click on File → Save as and then save it with whatever name you want and wherever you want
Next, make sure all currently Issued certificates are revoked, on the left panel Console Root → Certification Authority (Local) → Issued Certificates
Highlight all of the certificates issued to PowerStore and right-click on the highlighted certificates and select All Tasks → Revoke Certificate
Then a "Certificate Revocation" window will pop up; you can give the "Reason Code" if you would like, then click the "Yes" button
Next, under Console Root → Certificates (Local Computer) → Personal → Certificates
Right-click in the white space in the middle panel and select All Tasks → Request New Certificate
This will open the "Certificate Enrollment" window, click the "Next" button
Click "Next" again
On the "Request Certificates" section, find and click the check box next to "Domain Controller Authentication"
There should be a "Details" drop-down, click it, and then you should see a "Properties" button, click it
You can enter a "Friendly Name" if you would like to keep track of certificates you generate
Click on the "Subject" tab and under "Subject name" for the "Type" select "Common name" from the drop-down, and then enter in the full computer name for the LDAP server for the "Value", then click "Add"
You can find the "Full Computer Name" by opening a File Explorer, on the left side right-click "This PC" and select "Properties"; you should be able to see the "Full Computer Name" under the "Computer name, domain, and workgroup settings" section
Next, under the "Alternative name" section you can add whatever you would like, for this exercise I will add DNS and an IP Address (v4)
First, select "DNS" as your "Type" and enter the "Full Computer Name" as we did above for the "Common Name", then click "Add"
Second, select "IP Address (v4)" and enter in the LDAP Server IPv4 address for the LDAP Server, then click "Add"
This is what your "Certificate Properties" should look like once you have added everything
Click "Apply", then click "OK"
Finally, you can click "Enroll"
Once the new certificate is generated, you can export it to the "Desktop" so we can view the contents of the certificate
Right-click the new certificate All Tasks → Export
Click "Next"
Click "Next" (leave as default)
For the format, select "Base-64 encoded X.509 (.CER)", then click "Next"
Browse the location you would like to save this certificate and with whatever name you would like, then click "Next"
Finally, click "Finish", if successful, you should get a pop-up window with a success message "The export was successful"
Now you have successfully generated a new certificate for the LDAP server and ready to imported in PowerStore> Directory Services while selecting LDAPS Authentication.