Bug 1140829
| Summary: | [Doc] Keystone LDAPS connection using CA certificate | ||
|---|---|---|---|
| Product: | Red Hat OpenStack | Reporter: | Stephen Gordon <sgordon> |
| Component: | doc-Installation_and_Configuration_Guide | Assignee: | Suyog Sainkar <ssainkar> |
| Status: | CLOSED CURRENTRELEASE | QA Contact: | RHOS Documentation Team <rhos-docs> |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | 5.0 (RHEL 7) | CC: | adahms, anande, ayoung, ddomingo, erich, jdexter, nkinder, sgordon, ukalifon, yeylon |
| Target Milestone: | --- | Keywords: | Documentation, ZStream |
| Target Release: | 5.0 (RHEL 7) | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | 1140152 | Environment: | |
| Last Closed: | 2015-02-13 05:43:59 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1140152 | ||
| Bug Blocks: | |||
|
Comment 2
Nathan Kinder
2014-09-12 00:06:23 UTC
One more note to add to comment#2 is that the Keystone service needs to be restarted for the changes to take effect. Moving to ssainkar, who is now the author assigned to the Keystone component, for further processing and publication. Please also document how to create the cacert.pem file. It's got a header and a footer, and the contents of the ldap query that obtained the certificate: -----BEGIN CERTIFICATE----- MIIDbzCCAlegAwIBAgIQQD14hh1Yz7tPFLXCkKUOszANB.... -----END CERTIFICATE----- I'd also document the step that checks if ldaps is working, so that users can better troubleshoot their problem if something is not working and they're not sure if the cert file was created correctly or not. Run this query: LDAPTLS_CACERT=/path/to/cacert.pem ldapsearch -xLLL -ZZ -H $LDAPURL -D "$ADMIN_DN" -w "$ADMINPASSWORD" -s base -b "" "objectclass=*" currenttime It should return something like: dn: currentTime: 20141022050611.0Z |