Configuring Trusted Points

This section includes the following topics:

Trusted Points

When setting up LDAP over Secure Sockets Layer (SSL) protocol for user authentication, you need to create a trusted point for each LDAP server. The certificate in the trusted point can be any one of the following:
  • The certificate of the certificate authority (CA) that issued the LDAP server certificate.

  • If the CAs are organized in a hierarchy, the certificate of any of the CAs in the hierarchy.

  • The certificate of the LDAP server.

Configuring Trusted Points

Creating a Trusted Point

SUMMARY STEPS

  1. Choose Administration > Access Control > Trusted Point, then click Create Trusted Point.
  2. In the Create Trusted Point dialog box, complete the following fields, then click OK.

DETAILED STEPS


Step 1

Choose Administration > Access Control > Trusted Point, then click Create Trusted Point.

Step 2

In the Create Trusted Point dialog box, complete the following fields, then click OK.

Field Description

Name

Trusted point name.

Certificate Chain

Certificate information for this trusted point.


Editing a Trusted Point

SUMMARY STEPS

  1. Choose Administration > Access Control > Trusted Point, then click Edit.
  2. In the Edit dialog box, modify the certificate chain as appropriate, then click OK.

DETAILED STEPS


Step 1

Choose Administration > Access Control > Trusted Point, then click Edit.

Step 2

In the Edit dialog box, modify the certificate chain as appropriate, then click OK.

The Name and Fingerprint fields cannot be modified.


Deleting a Trusted Point

SUMMARY STEPS

  1. Choose Administration > Access Control > Trusted Point > trusted-point, then click Delete.
  2. When prompted, confirm the deletion.

DETAILED STEPS


Step 1

Choose Administration > Access Control > Trusted Point > trusted-point, then click Delete.

Step 2

When prompted, confirm the deletion.