EasyManua.ls Logo

Cisco TelePresence - Configuring an Openldap Server

Cisco TelePresence
507 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
n Be located in the Local Computer’s Personal certificate store. This can be seen using the Certificates
MMC snap-in.
n Have the private details on how to obtain a key associated for use with it stored locally. When viewing the
certificate you should see a message saying You have a private key that corresponds to this certificate’’.
n Have a private key that does not have strong private key protection enabled. This is an attribute that can be
added to a key request.
n The Enhanced Key Usage extension includes the Server Authentication object identifier, again this forms
part of the key request.
n Issued by a CA that both the domain controller and the client trust.
n Include the Active Directory fully qualified domain name of the domain controller in the common name in
the subject field and/or the DNS entry in the subject alternative name extension.
To configure the VCS to use TLS on the connection to the LDAP server you must upload the CA’s certificate
as a trusted CA certificate. This can be done on the VCS by going to: Maintenance > Security certificates
> Trusted CA certificate.
Configuring an OpenLDAP server
Prerequisites
These instructions assume that an OpenLDAP server has already been installed. For details on installing
OpenLDAP see the documentation at http://www.openldap.org.
The following examples use a standard OpenLDAP installation on the Linux platform. For installations on
other platforms the location of the OpenLDAP configuration files may be different. See the OpenLDAP
installation documentation for details.
Cisco VCS Administrator Guide (X8.1.1) Page 379 of 507
Reference material
LDAP server configuration for device authentication

Table of Contents

Other manuals for Cisco TelePresence

Related product manuals