This issue arises as customers want to confirm certificate-based authentication using CA Directory using ldapsearch and/or dxsearch. The step one is configure a DSA that only accepts certificate authentication.
CA Directory 14.1/Linux
The dxsearch utility as it is does not seem to have the ability to use certificate to authenticate with a CA Directory DSA. Out of the box, we do have the samples dua and ldua that can be used for this purpose.
Here we use the out-of-the-box samples/democorp, samples/unspsc, and samples/ssl as the base to demonstrate how a CA Directory DSA can be configured to accept certificate only authentication.
Install OpenLDAP clients
Setup Steps
Verification using ldapsearch: The marco_drew.pem file used below was created after samples/ssl setup. There are actually two ways to set the certificate used to authenticate:
Also, the following run using the Marco Drew DN and password with fail
ldapsearch -H ldaps://"$(hostname)":19389 -D "cn=Marco DREW,ou=Information,ou=Corporate,o=DEMOCORP,c=AU" -w test \
-b "o=democorp,c=au" 'userpassword=*'
and received
ldap_bind: Inappropriate authentication (48)
LDAP.CONF(5) - OpenLDAP LDAP.CONF man page
OpenLDAP Client is one of the most popular ldap clients. There are many other ldap clients out there including dxsearch, ldua out of the CA Directory installation and jxplorer that CA Technology donated to the open-source community. The ability to use certificate instead of DN/password varies. It is client specific and hence one will need to consult its specific documentation to determine whether/how it can handle the certificate-based authentication.