Published on : September 29, 2012 by George K.
Server security audit is a continuous process and it is important that the servers are secure from vulnerabilities and hacker. As we know, the security of a server is quite essential as long as it is active. In most cases, a mistake happens during the initial server set up will lead to a disaster at […]
Published on : July 5, 2012 by Scott S
If you have set up replication between servers, it is an always a better practice to encrypt (StartTLS) the replication traffic to stop others from sniffing your data. This is distinct from using encryption with authentication as we did in https://www.supportsages.com/2012/06/ldap-configuration-for-user-and-group-centralised-authentication-on-ubuntu-lts-12-04-part-3 . Le us see discuss how to do the LDAP replication with tls authetication. […]
Published on : by Scott S
Since all the LDAP clients depend on the LDAP server for its functioning, it is very important that the LDAP server is available all the time to serve the request of the clients. In such an environment, it is a standard practice to setup LDAP backup server into LDAP setup to prevent the LDAP server […]
Published on : June 18, 2012 by Scott S
TLS Authentication of LDAP sessions: Till now all the sessions made by the LDAP client to the server is open and not encrypted. Its time to make our LDAP client-server sessions encrypted by some mechanisms. The most common encryption method includes Transport Layer Security (TLS) and/or Secure Sockets Layer (SSL) encryption. Here, we are using […]
Published on : June 12, 2012 by Scott S
PART-2 Now its time we make our LDAP configurations in a more useful way so that it meets some of the basic needs of an organization. The first part is that, an LDAP client or user should be granted privileges to change his own password. Lets see how that can be accomplished. ALLOW […]