The security type to use for communications with the LDAP server. Use one of the following options:
ClearText
. Use plain text communications.
SSL
. Use Secure Socket Layer (SSL) communications.
TLS
. Use TLS for communications.
To use SSL communications, you must install the SSL certificate of the LDAP server for the user that runs HPE Community Component. You must also turn off client verification on the LDAP server, or create a client certificate for HPE Community Component (signed by a Certification Authority (CA) that the LDAP server trusts).
Kerberos
. Use Kerberos security for communications.
When you are using a Kerberized LDAP server, you must also set LDAPKerberosRealm to the Kerberos realm. In addition, you must set BaseDN to the name of a user who can get a Ticket-Granting-Ticket within Kerberos, and BaseDNPassword to the password for this user.
The LDAPServer configuration parameter must contain the full name of the LDAP server, as it appears on the server SSL certificate. You might also need to change the LDAPPort parameter to 636
for SSL communications.
Type: | String |
Default: | ClearText
|
Required: | No |
Configuration Section: | MySecurityRepository
|
Example: | LDAPSecurityType=SSL
|
See Also: | LDAPPort
LDAPServer LDAPKerberosRealm |
|