JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Directory Server Enterprise Edition Administration Guide 11g Release 1 (11.1.1.5.0)
search filter icon
search icon

Document Information

Preface

Part I Directory Server Administration

1.  Directory Server Tools

2.  Directory Server Instances and Suffixes

3.  Directory Server Configuration

4.  Directory Server Entries

5.  Directory Server Security

6.  Directory Server Access Control

7.  Directory Server Password Policy

8.  Directory Server Backup and Restore

9.  Directory Server Groups, Roles, and CoS

10.  Directory Server Replication

11.  Directory Server Schema

12.  Directory Server Indexing

13.  Directory Server Attribute Value Uniqueness

14.  Directory Server Logging

15.  Directory Server Monitoring

Part II Directory Proxy Server Administration

16.  Directory Proxy Server Tools

17.  Directory Proxy Server Instances

18.  LDAP Data Views

19.  Directory Proxy Server Certificates

Default Self-Signed Certificate

Viewing the Default Self-Signed Certificate

Creating, Requesting and Installing Certificates for Directory Proxy Server

To Create a Non-default Self-Signed Certificate for Directory Proxy Server

To Request a CA-Signed Certificate for Directory Proxy Server

To Install a CA-Signed Server Certificate for Directory Proxy Server

Renewing an Expired CA-Signed Certificate for Directory Proxy Server

To Renew an Expired CA-Signed Server Certificate for Directory Proxy Server

Listing Certificates

To List Server Certificates

To List CA Certificates

Adding a Certificate From a Back-End LDAP Server to the Certificate Database on Directory Proxy Server

To Add a Certificate From a Back-End Directory Server to the Certificate Database on Directory Proxy Server

Exporting a Certificate to a Back-End LDAP Server

To Configure Directory Proxy Server to Export a Client Certificate to a Back-End LDAP Server

Backing Up and Restoring a Certificate Database for Directory Proxy Server

Prompting for a Password to Access the Certificate Database

To Prompt for a Password to Access the Certificate Database

To Disable the Password Prompt to Access the Certificate Database

20.  Directory Proxy Server Load Balancing and Client Affinity

21.  Directory Proxy Server Distribution

22.  Directory Proxy Server Virtualization

23.  Virtual Data Transformations

24.  Connections Between Directory Proxy Server and Back-End LDAP Servers

25.  Connections Between Clients and Directory Proxy Server

26.  Directory Proxy Server Client Authentication

27.  Directory Proxy Server Logging

28.  Directory Proxy Server Monitoring and Alerts

Part III Directory Service Control Center Administration

29.  Directory Service Control Center Configuration

Index

Adding a Certificate From a Back-End LDAP Server to the Certificate Database on Directory Proxy Server

This section describes how to add a certificate from a back-end LDAP server to the certificate database on Directory Proxy Server.

To Add a Certificate From a Back-End Directory Server to the Certificate Database on Directory Proxy Server

You can use DSCC to perform this task. For information, see Directory Service Control Center Interface and the DSCC online help.

  1. Display the certificate from the back-end Directory Server in PEM format by using this command syntax:
    dsadm show-cert -F ascii instance-path [cert-alias]

    If you do not specify a cert-alias, the default server certificate is displayed. For a description of all command options, see the dsadm(1M) man page.

    For example, show the default self-signed server certificate as follows:

    $ dsadm show-cert -F ascii /local/dsInst defaultCert
    -----BEGIN CERTIFICATE-----
    MIICJjCCAY+gAwIBAgIFAIKL36kwDQYJKoZIhvcNAQEEBQAwVzEZMBcGA1UEChMQ
    U3VuIE1pY3Jvc3lzdGVtczEZMBcGA1UEAxMQRGlyZWN0b3J5IFNlcnZlcjENMAsG
    A1UEAxMEMjAxMTEQMA4GA1UEAxMHY29uZHlsZTAeFw0wNjA1MjIxMTQxNTVaFw0w
    NjA4MjIxMTQxNTVaMFcxGTAXBgNVBAoTEFN1biBNaWNyb3N5c3RlbXMxGTAXBgNV
    BAMTEERpcmVjdG9yeSBTZXJ2ZXIxDTALBgNVBAMTBDIwMTExEDAOBgNVBAMTB2Nv
    bmR5bGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAK9U3ry3sJmEzwQY8CGd
    7S2MTZuBedo03Vea1lfDtD08WIsdDMzhHplTdeHAkWWNc8g2PDcEFXeWp9UXFMuD
    Pcia7t8HtFkm73VmlriWhMd8nn3l2vkxhsPK2LHFEeOIUDR9LBBiMiEeLkjdoEhE
    VLMSoYKqKI+Aa5grINdmtFzBAgMBAAEwDQYJKoZIhvcNAQEEBQADgYEAF4eDbSd7
    qy2l10dIogT+rnXZ362gLTlQFCblhbGpmmptbegUdL1ITGv/62q1isPV2rW7CkjM
    Cqb0fo3k5UkKKvW+JbMowpQeAPnlgpX612HuDr1tldnKV4eyU7gpG31t/cpACALQ
    7OPi1A7oVb2Z8OJKfEJHkp3txBSsiI2gTkk=
    -----END CERTIFICATE-----
  2. Save the certificate.

    Save your certificate in a text file, and back up the certificate in a safe location.

  3. Add the certificate from the back-end LDAP server to the certificate database on an instance of Directory Proxy Server.
    $ dpadm add-cert instance-path cert-alias cert-file

    where cert-alias is the name of the certificate and cert-file is the name of the file containing the certificate.

    For example, you could add the certificate defaultCert as follows:

    $ dpadm add-cert /local/dps defaultCert /local/safeplace/defaultCert.ascii