My activities

Integrating RiskVision with an AD Using Secure LDAP and Certifications

This article describes how to configure RiskVision to connect to an Active Directory for user authentication using Secure LDAP and certificates.

In order to leverage this functionality, the AD server (or servers if a DNS alias is to be used) must be configured to accept secure LDAP requests and must have a certificate (X.509 format preferably) available for RiskVision’s use.

  1. The first step will be to create a keystore for the AD certificate(s). The keystore contains private key content that the RiskVision server will use to authenticate itself to the remote AD server.  Execute this command within a command shell:   %AGILIANCE_HOME%\java\bin\keytool genkey keyalg RSA keystore path\to\keystore.jks. The user will be prompted to provide the name and organizational details for the keystore, as well as a password that will be needed later.
  2. After obtaining the AD server’s certificate, import it into the newly created keystore using this command and the password from step 1: %AGILIANCE_HOME%\java\bin\keytool -import -alias ldapCert -file path\to\cert.cer
    • -keystore path\to\keystore.jks
    • NOTE: Microsoft's Certificate Manager has an option to export a certificate to pkcs12 format. If that is used, then these commands, which are dependent upon having the Win32 OpenSSL binaries installed, can convert the certificate to X.509 format: OpenSSL pkcs7 in the cert.p7b ‘print_certs’ out-out.pem OpenSSL x509 ‘in out.pem ‘out server.cer
  3. A truststore will need to be created for trusted certificates, such as those used by the remote AD server or those from certificate authorities that are used to verify other identities.
    • %AGILIANCE_HOME%\java\bin\keytool genkey keyalg RSA keystore \path\to\truststore.jks
    • As with the keystore, the user will be prompted to supply a password and organizational details for the truststore.
  4. Import the trusted public key into the truststore with this command:
    • %AGILIANCE_HOME%\java\bin\keytool -import -v -trustcacerts -alias CAcert -file \path\to\ca_cert.cer keystore \path\to\truststore.jks
  5. Stop Apache Tomcat.
  6. Open the Windows Registry by running regedit. Locate the following registry key: 32-bit installation:
    • HKEY_LOCAL_MACHINE\SOFTWARE\Apache Software Foundation\Procrun 2.0\Tomcat8\Parameters\Java 64-bit installation: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Apache Software
  7. Add the following entries to the Options value:
    • -Djavax.net .ssl.keyStore=\path\to\keystore.jks -Djavax.net .ssl.keyStoreType=JKS -Djavax.net .ssl.algorithm=SHA1withRSA -Djavax.net .ssl.keyStorePassword=<keystore password> -Djavax.net .ssl.trustStore=\path\to\truststore.jks -Djavax.net .ssl.trustStoreType=JKS -Djavax.net .ssl.trustStorePassword=<truststore password>
  8. Close the registry and restart the Apache Tomcat service.
  9. Log in as administrator, go to Administration > Connectors and click the Authentication Connector link.
  10. In the Configuration view, provide the IP or hostname of the AD server. Select Secure LDAP from the protocol select list. Also, provide the top-level domain for the directory (e.g., company.com - this will autoresolve to dc=company,dc=com). If the customer needs to search through AD for user accounts, then an account with reading access to the directory will need to be supplied.
  11. After the configuration has been saved, the user can click Commands tab to test the authentication connector setup.
Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request
Powered by Zendesk