How to trust self-signed CA-Certificate-Chain for LibreNMS Active Directory Authentication?

Hi folks
I have a rather beginner’s question.

We have our own Windows PKI with an offline CA and a SUBCA issuing our certificates. It’s quite easy then to make nginx on our LibreNMS-Server (Ubuntu 20) to trust these CA-Certs so we can use HTTPS with that issued client cert. That works.

BUT: We try to set up AD-auth via LDAPS/636 for LibreNMS and… we fail miserably. Before I post a thousand error logs: The problem is basically that I don’t know how it is supposed to work.

So my question: Is there any manual or doc anywhere that describes how LDAPS Auth with Certs basically works (in terms of what certificate has to be installed and configured where). Maybe someone already did this and has a step by step how-to to achieve the goal?

I literally googled for hours but could only find snippets of stuff, that didn’t show me the picture.

Appreciate your help.
Dan

etc

You can also disable ssl cert verification (for testing).

Thanks murrant! In one of these Howtos I see a point that I’ve completely missed. I will check it out soon and report back what helped :slight_smile:

This topic was automatically closed 186 days after the last reply. New replies are no longer allowed.