Toby,
The issue is that many TLS client libraries expect that the host name used for the connection should either match the subject on the certificate, or a subject alternative name (SAN) on the certificate. In your case, "
dev-ldap7-1.usd.edu" does not match "dev-ldap7-1.636.Directory Server.Sun Microsystems".
Some libraries let you disable host name verification, which might be OK if this is a development environment, though I'm not sure how you'd do that in this case.
Other options might include:
* Update the certificate on your LDAP service to include a subject or SAN that matches the DNS name used to connect. This is likely the only reasonable option in a production environment.
* If it is a DEV environment, you could try running without TLS and just using port 389 of your DEV LDAP service can be configured that way.
Thanks,
Carl Waldbieser
ITS Identity Management
Lafayette College
--
- CAS gitter chatroom:
https://gitter.im/apereo/cas
- CAS mailing list guidelines:
https://apereo.github.io/cas/Mailing-Lists.html
- CAS documentation website:
https://apereo.github.io/cas
- CAS project website:
https://github.com/apereo/cas
---
You received this message because you are subscribed to the Google Groups "CAS Community" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
cas-user+u...@apereo.org.
To view this discussion on the web visit
https://groups.google.com/a/apereo.org/d/msgid/cas-user/0feb6647-e139-43b1-adac-4c9aed32fb8e%40apereo.org.