LDAP directory servers, mainly used as an authentication repository, are often used to store sensitive information like passwords and other account details. If your ELM environment uses an external LDAP-based user repository, such as IBM Tivoli Directory Server or Microsoft Active Directory, you can configure it to communicate over a secure SSL channel.
This article assumes that you have already an existing connection to an LDAP server set up.
Your LDAP server, must be configured to accept SSL connections and be running on secured port number (636). Refer to your LDAP server documentation if you need to create a signer certificate, which as part of this task, must be imported from your LDAP server into the trust store of the application server.
This article provides step by step instructions on configuring ELM with secure LDAP(LDAPS)
Liberty Server
*NOTE: Ensure you have a working LDAP configuration with CLM before enabling LDAP SSL.*
Reference:
ConfigureLDAPforLibertyProfile
Configure secure LDAP in Liberty
- Enable Require SSL and update the LDAP Port to secure port in the ldapUserRegistry.xml file located in \server\liberty\servers\clm\conf\
NOTE: Any changes to the group / ldap properties if made had to be corrected in the application.xml file located in \server\liberty\servers\clm\conf\
- Ensure to include the below features in the ldapUserRegistry.xml
- Edit the LDAP configuration in the Liberty server in ldapUserRegistry.xml file
- Proceed with the next section to add LDAP SSL certificate
Add LDAP SSL certificate
- To configuration secure LDAP, obtain the SSL signer certificate from the LDAP server
- From the file explorer, navigate to \server\jre\bin and double click on ikeyman.exe
- To open an existing keystore file, Click on
- Choose the Key database type from the drop-down and click on Browse to select the key database file(kdb). Enter the password and click on Ok to open the file
- After the kdb is open, click on the drop-down and choose Signer Certificate
- Click on Add and browse the signer certificate file(.arm) obtained from the LDAP server, then click ok to add the certificate
- Proceed with the next section to configure secure LDAP in JTS server
Alternatively you can generate the certificate using the following command line:
ikeycmd -cert -add -db -type kdb <dbname.kdb> -file <certfile.arm> -pw
Configuring secure LDAP In JTS server
NOTE: Any changes to the group / ldap properties if made has to be corrected here
- Login to https://clmexample.com:9443/jts/setup, proceed to the User Registry section
- In the User Registry section, edit the LDAP host configuration to update the LDAP port to secure port
- Perform a test connection and ensure the LDAP configuration succeeds
- Restart the Liberty server
WebSphere Application Server
NOTE: Ensure you have a working LDAP configuration with CLM before enabling LDAP SSL.
Configure secure LDAP in WAS
- Enable Require SSL
- Change LDAP PORT to secure port

Add LDAP SSL certificate
- Login to WebSphere Application Server Administration Console Navigate to Security > SSL certificate and key management
- Click on Key stores and certificates
- Click on NodeDefaultTrustStore
- Click on Signer certificates
- Click Retrieve from port to retrieve the LDAP SSL certificate from the LDAP server
- Enter the LDAPS server details and click on Retrieve signer information
- Confirm the SSL certificate for LDAPS Server is retrieved and then click OK
- Click on Save
- Proceed with the next section to configure secure LDAP in JTS Server
Configuring secure LDAP In JTS server
NOTE: Any changes to the group / ldap properties if made has to be corrected here
- Login to https://clmexample.com:9443/jts/setup, proceed to the User Registry section
- In the User Registry section, edit the LDAP host configuration to update the LDAP port to secure port
- Perform a test connection and ensure the LDAP configuration succeeds
- Proceed with the next section to remap group mappings in WAS
Remap Security Group Mappings in WAS
- Login to WAS Administration Console
- Remove and re-add the user/group mappings under Security role to user/group mapping for each of the CLM/ELM applications Remap war files
- Restart WAS
External links: