Configuring and using LDAP - "error: x509: certificate signed by unknown authority" #797
-
Hi everyone! It's me again! We are trying to configure OpenShift (OKD) to consume our LDAP for the authentication process. Our LDAP directory does not require authentication ("bindPassword", "secret"). It is also not an LDAPS and therefore does not need a certificate ("configmap"). In view of the above, we are configuring access via LDAP as shown below...
However, when we try to use a valid user the following error happens...
What could be going wrong? We are following these guidelines: https://docs.okd.io/latest/authentication/identity_providers/configuring-ldap-identity-provider.html []'s |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 1 reply
-
Hi,
I think you’ve got a new installation. The warning about the certificate is not related to the ldaps connect, this warning comes from the API access to your server. Default there’s a self signed certificate on the API.
You can check back with:
curl -vv -k https://api.myokdserver.whateverdomain:6443/ <https://api.myokdserver.whateverdomain:6443/>
Now you can see the cert!
You can exchange these cert, but’s that’s another task ;-)
peter pfläging
***@***.*** ***@***.***>
📞+43 699 1410 7990 (Tel, Signal, Telegram)
🏠 In den Jochen 49, A-2122 Ulrichskirchen, Austria
🌍 https://www.pflaeging.net/ <http://www.pflaeging.net/>
🌍 https://www.stickiebox.org/ <http://www.pflaeging.net/>
… Am 29.07.2021 um 02:06 schrieb Eduardo Lúcio Amorim Costa ***@***.***>:
Hi everyone! It's me again!
We are trying to configure OpenShift (OKD) to consume our LDAP for the authentication process.
Our LDAP directory does not require authentication ("bindPassword", "secret"). It is also not an LDAPS and therefore does not need a certificate ("configmap").
In view of the above, we are configuring access via LDAP as shown below...
cat <<EOF | oc apply -f -
---
apiVersion: config.openshift.io/v1
kind: OAuth
metadata:
name: cluster
spec:
identityProviders:
- name: ldapidp
mappingMethod: claim
type: LDAP
ldap:
attributes:
id:
- dn
email:
- mail
name:
- cn
preferredUsername:
- uid
bindDN: ""
insecure: true
url: "ldap://10.2.0.5:389/dc=somedm,dc=abc,dc=xy?uid"
EOF
However, when we try to use a valid user the following error happens...
***@***.*** ~]# oc login -u someuser
error: x509: certificate signed by unknown authority
What could be going wrong?
We are following these guidelines: https://docs.okd.io/latest/authentication/identity_providers/configuring-ldap-identity-provider.html <https://docs.okd.io/latest/authentication/identity_providers/configuring-ldap-identity-provider.html>
[]'s
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub <#797>, or unsubscribe <https://github.com/notifications/unsubscribe-auth/AAF4R6AUW3MWNIDF7XZNRK3T2CLQ5ANCNFSM5BFLP2RA>.
|
Beta Was this translation helpful? Give feedback.
-
This might be a client side issue. Try |
Beta Was this translation helpful? Give feedback.
-
Solution here! []'s |
Beta Was this translation helpful? Give feedback.
Solution here!
https://github.com/eduardolucioac/okd_bare_metal#avoid-error-x509-certificate-signed-by-unknown-authority-okd_services
[]'s