Enforcing Policy Server TLS1.2 handshake to LDAP Policy, User Stores
search cancel

Enforcing Policy Server TLS1.2 handshake to LDAP Policy, User Stores

book

Article ID: 189441

calendar_today

Updated On:

Products

CA Single Sign On Secure Proxy Server (SiteMinder) CA Single Sign On Agents (SiteMinder) CA Single Sign On Federation (SiteMinder) CA Single Sign On SOA Security Manager (SiteMinder) SITEMINDER

Issue/Introduction


When running a Policy Server, how could the usage of TLSv1.2 be enforced when the connection to the backend LDAP Policy or User Stores?

How to enable SSL to debug logs too when connecting to this LDAP Directory?

 

Resolution


In an SSL handshake, the version of SSL is chosen by the server.

In the case of the Policy Server connecting to the LDAP User Store, the LDAP User Store is the server and Policy Server is the client.

So, the Policy Server will tell the LDAP User Store which versions of TLS it can handle, in the case of version 12.8SP3 for instance, TLSv1.0, TLSv1.1, and TLSv1.2.

Then the LDAP User Directory will select the version and send the certificate (1).

To see which protocol is supported by the LDAP version, run the openssl command:

# openssl s_client -tls1_2 -connect <HOST2>:<SSL_PORT2>
CONNECTED(00000003)

Running network traces on the Policy Server will help. The TLS packets exchanged between the Policy Server and the LDAP User Directory will show the version of TLS.

 

Additional Information