<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic LDAPS With Self Signed Cert in Managing Users</title>
    <link>https://community.cisco.com/t5/managing-users/ldaps-with-self-signed-cert/m-p/4876956#M117</link>
    <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;I have been banging my head against Google trying to get Duo Auth Proxy (Ubuntu) to work with LDAPS using a self signed cert. I have confirmed that LDAPS is working using the cert I created. Ldp.exe binds LDAPS (after I import the .cer into my Windows PC), a SaaS service is able to use LDAPS, and our Meraki AD integration picked it up. I have double and triple checked my DC to make sure I have the correct cert.&lt;/P&gt;
&lt;P&gt;Duo works fine when I comment out the LDAPS strings in the ad_client section of my config file.&lt;/P&gt;
&lt;P&gt;The cert was created in PowerShell, and the correct hostnames are being used. I put the .PFX in the personal computer store on the Domain Controller, and exported that same .PFX in .CER Base64, then converted that to .PEM using OpenSSL.&lt;/P&gt;
&lt;P&gt;I am using a Duo free account if that makes any difference.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;&lt;DIV class="lightbox-wrapper"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="2X_b_b46278f0763f0456462e3dd285305f3c4ff34efe.png" style="width: 690px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/191279i189B0255B4ED48F1/image-size/large?v=v2&amp;amp;px=999" role="button" title="2X_b_b46278f0763f0456462e3dd285305f3c4ff34efe.png" alt="2X_b_b46278f0763f0456462e3dd285305f3c4ff34efe.png" /&gt;&lt;/span&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;</description>
    <pubDate>Thu, 06 Jan 2022 22:04:50 GMT</pubDate>
    <dc:creator>Darcon</dc:creator>
    <dc:date>2022-01-06T22:04:50Z</dc:date>
    <item>
      <title>LDAPS With Self Signed Cert</title>
      <link>https://community.cisco.com/t5/managing-users/ldaps-with-self-signed-cert/m-p/4876956#M117</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;I have been banging my head against Google trying to get Duo Auth Proxy (Ubuntu) to work with LDAPS using a self signed cert. I have confirmed that LDAPS is working using the cert I created. Ldp.exe binds LDAPS (after I import the .cer into my Windows PC), a SaaS service is able to use LDAPS, and our Meraki AD integration picked it up. I have double and triple checked my DC to make sure I have the correct cert.&lt;/P&gt;
&lt;P&gt;Duo works fine when I comment out the LDAPS strings in the ad_client section of my config file.&lt;/P&gt;
&lt;P&gt;The cert was created in PowerShell, and the correct hostnames are being used. I put the .PFX in the personal computer store on the Domain Controller, and exported that same .PFX in .CER Base64, then converted that to .PEM using OpenSSL.&lt;/P&gt;
&lt;P&gt;I am using a Duo free account if that makes any difference.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;&lt;DIV class="lightbox-wrapper"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="2X_b_b46278f0763f0456462e3dd285305f3c4ff34efe.png" style="width: 690px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/191279i189B0255B4ED48F1/image-size/large?v=v2&amp;amp;px=999" role="button" title="2X_b_b46278f0763f0456462e3dd285305f3c4ff34efe.png" alt="2X_b_b46278f0763f0456462e3dd285305f3c4ff34efe.png" /&gt;&lt;/span&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 06 Jan 2022 22:04:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/managing-users/ldaps-with-self-signed-cert/m-p/4876956#M117</guid>
      <dc:creator>Darcon</dc:creator>
      <dc:date>2022-01-06T22:04:50Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS With Self Signed Cert</title>
      <link>https://community.cisco.com/t5/managing-users/ldaps-with-self-signed-cert/m-p/4876957#M118</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Since the cert is self-signed, it is its own CA, and has to be added to the “SSL CA certs file” as mentioned in your error message. (Or change the Auth Proxy’s config to point to a new file containing a copy of the cert.)&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 06 Jan 2022 23:08:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/managing-users/ldaps-with-self-signed-cert/m-p/4876957#M118</guid>
      <dc:creator>pgp</dc:creator>
      <dc:date>2022-01-06T23:08:31Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS With Self Signed Cert</title>
      <link>https://community.cisco.com/t5/managing-users/ldaps-with-self-signed-cert/m-p/4876958#M119</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;I am specifying the exported .PEM in the authproxy config. See below for the LDAPS parts in my config:&lt;/P&gt;
&lt;P&gt;transport=ldaps&lt;BR /&gt;
ssl_ca_certs_file=dc.pem &lt;EM&gt;exported pem in /conf&lt;/EM&gt;&lt;BR /&gt;
ssl_verify_hostname=true&lt;/P&gt;
&lt;P&gt;I’ll look into the SSL CA certs file. Thanks!&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 06 Jan 2022 23:35:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/managing-users/ldaps-with-self-signed-cert/m-p/4876958#M119</guid>
      <dc:creator>Darcon</dc:creator>
      <dc:date>2022-01-06T23:35:56Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS With Self Signed Cert</title>
      <link>https://community.cisco.com/t5/managing-users/ldaps-with-self-signed-cert/m-p/4876959#M120</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;I created a new cert using OpenSSL on Linux and got everything working. I don’t know why it didn’t like the cert I created with PowerShell, possibly because it was a 6 year cert? The new one is only 1 year.&lt;/P&gt;
&lt;P&gt;I generated the .KEY and .CRT, then converted the .KEY to .PFX. This was all done with OpenSSL.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 07 Jan 2022 14:38:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/managing-users/ldaps-with-self-signed-cert/m-p/4876959#M120</guid>
      <dc:creator>Darcon</dc:creator>
      <dc:date>2022-01-07T14:38:15Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS With Self Signed Cert</title>
      <link>https://community.cisco.com/t5/managing-users/ldaps-with-self-signed-cert/m-p/4876960#M121</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Did the first self-signed cert include “Certificate Signing” in its key usage? That is an extra requirement we have (mentioned in the description of the &lt;A href="https://duo.com/docs/authproxy-reference#ad_client"&gt;ad_client&lt;/A&gt; &lt;CODE&gt;ssl_ca_certs_file&lt;/CODE&gt; parameter) when you use a self-signed cert. I don’t think &lt;CODE&gt;New-SelfSignedCertificate&lt;/CODE&gt; includes that key usage by default.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 10 Jan 2022 15:52:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/managing-users/ldaps-with-self-signed-cert/m-p/4876960#M121</guid>
      <dc:creator>DuoKristina</dc:creator>
      <dc:date>2022-01-10T15:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS With Self Signed Cert</title>
      <link>https://community.cisco.com/t5/managing-users/ldaps-with-self-signed-cert/m-p/4876961#M122</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;ASIDE class="quote group-Duo_Staff" data-username="DuoKristina" data-post="5" data-topic="11275"&gt;
&lt;DIV class="title"&gt;
&lt;DIV class="quote-controls"&gt;&lt;/DIV&gt;
&lt;IMG width="20" height="20" src="https://community.cisco.com/legacyfs/online/ciscoduo/avatar_quotes/duokristina.png" style="display : inline;" /&gt; DuoKristina:&lt;/DIV&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Did the first self-signed cert include “Certificate Signing” in its key usage? That is an extra requirement we have&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;/ASIDE&gt;
&lt;P&gt;That was most likely it. I can’t find any reference to “Certificate Signing” in the New-SelfSignedCertificate cmdlet. All I worried about were the correct hostname/alternative names, then exported the .PFX and .CRT files. The Org/OU/etc fields were all left blank unlike my OpenSSL cert. I also had to create the .PFX using the .KEY and .CER files that were created with OpenSSL.&lt;/P&gt;
&lt;P&gt;Hopefully this helps someone.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 10 Jan 2022 17:18:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/managing-users/ldaps-with-self-signed-cert/m-p/4876961#M122</guid>
      <dc:creator>Darcon</dc:creator>
      <dc:date>2022-01-10T17:18:22Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS With Self Signed Cert</title>
      <link>https://community.cisco.com/t5/managing-users/ldaps-with-self-signed-cert/m-p/4876962#M123</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;ASIDE class="quote no-group" data-username="Darcon" data-post="6" data-topic="11275"&gt;
&lt;DIV class="title"&gt;
&lt;DIV class="quote-controls"&gt;&lt;/DIV&gt;
&lt;IMG width="20" height="20" src="https://community.cisco.com/legacyfs/online/ciscoduo/letters/d_f19dbf.png" style="display : inline;" /&gt; Darcon:&lt;/DIV&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;New-SelfSignedCertificate&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;/ASIDE&gt;
&lt;P&gt;&lt;CODE&gt;-keyusage certsign&lt;/CODE&gt;&lt;/P&gt;
&lt;ASIDE class="onebox allowlistedgeneric" data-onebox-src="https://docs.microsoft.com/en-us/powershell/module/pki/new-selfsignedcertificate?view=windowsserver2022-ps"&gt;
  &lt;HEADER class="source"&gt;

      &lt;A href="https://docs.microsoft.com/en-us/powershell/module/pki/new-selfsignedcertificate?view=windowsserver2022-ps" target="_blank" rel="noopener"&gt;docs.microsoft.com&lt;/A&gt;
  &lt;/HEADER&gt;

  &lt;ARTICLE class="onebox-body"&gt;
    &lt;span class="lia-inline-image-display-wrapper" image-alt="2X_0_0f05aa1294a274848a79f532a62e49fdce1bb536.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/191383i1120AB9D1D82026C/image-size/large?v=v2&amp;amp;px=999" role="button" title="2X_0_0f05aa1294a274848a79f532a62e49fdce1bb536.png" alt="2X_0_0f05aa1294a274848a79f532a62e49fdce1bb536.png" /&gt;&lt;/span&gt;

&lt;H3&gt;&lt;A href="https://docs.microsoft.com/en-us/powershell/module/pki/new-selfsignedcertificate?view=windowsserver2022-ps" target="_blank" rel="noopener"&gt;New-SelfSignedCertificate (pki)&lt;/A&gt;&lt;/H3&gt;

  &lt;P&gt;Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.&lt;/P&gt;


  &lt;/ARTICLE&gt;

  &lt;DIV class="onebox-metadata"&gt;
    
    
  &lt;/DIV&gt;

  &lt;DIV style="clear: both"&gt;&lt;/DIV&gt;
&lt;/ASIDE&gt;

&lt;PRE&gt;&lt;CODE class="lang-auto"&gt;Specifies the key usages set in the key usage extension of the certificate. The acceptable values for this parameter are:

CertSign
CRLSign
DataEncipherment
DecipherOnly
DigitalSignature
EncipherOnly
KeyAgreement
KeyEncipherment
None (default)
NonRepudiation&lt;/CODE&gt;&lt;/PRE&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 10 Jan 2022 17:34:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/managing-users/ldaps-with-self-signed-cert/m-p/4876962#M123</guid>
      <dc:creator>DuoKristina</dc:creator>
      <dc:date>2022-01-10T17:34:46Z</dc:date>
    </item>
  </channel>
</rss>

