<spi name="truststore">
<provider name="file" enabled="true">
<properties>
<property name="file" value="path to your .jks file containing public certificates"/>
<property name="password" value="password"/>
<property name="hostname-verification-policy" value="WILDCARD"/>
<property name="disabled" value="false"/>
</properties>
</provider>
</spi>
--
You received this message because you are subscribed to the Google Groups "Keycloak User" group.
To unsubscribe from this group and stop receiving emails from it, send an email to keycloak-use...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/keycloak-user/e10b929a-2b3a-4e03-9573-4dcb420b990eo%40googlegroups.com.
If the provided LDAP server certificate was correct, upon Keycloak launch, configuring the LDAP identity provider and clicking
the "Test authentication" button, the SSL/TLS connection should work (you should get "Success" message upon button click).
Btw. you can always debug SSL/TLS issues by adding "-Djavax.net.debug=all" property to Keycloak launch to see
more verbose error output.
HTH
Regards, Jan
--
Jan iankko Lieskovsky / Keycloak / RH-SSO Team
To view this discussion on the web visit https://groups.google.com/d/msgid/keycloak-user/a98b46e2-fbc9-4594-aaf9-ae4f633c9155n%40googlegroups.com.
Hi Jan,I appreciate your reply. I tried editing the standalone.xml but Keycloak isn't starting properly, so I left it to default settings.I also tried creating the server.truststore using the exported LDAP certificate installed on my machine.I still get the error of
2020-08-04 10:41:10,962 ERROR [org.keycloak.services] (default task-3) KC-SERVICES0055: Error when authenticating to LDAP: simple bind failed: <ldap-ip-address>:636: javax.naming.CommunicationException: simple bind failed: <ldap-ip-address>:636 [Root exception is javax.net.ssl.SSLHandshakeException: java.security.cert.CertificateException: No subject alternative names matching IP address <ldap-ip-address> found]
Can you enlighten me more on how to integrate LDAPS on Keycloak?By the way, I am using a Windows VM, using standalone.bat (plus the mentioned Java arguments)Thanks!
To view this discussion on the web visit https://groups.google.com/d/msgid/keycloak-user/81cda306-d025-4ee8-84dc-8cdac734cd4dn%40googlegroups.com.
Hi Jan,
So I was preoccupied with my other tasks, now I get back to the Keycloak LDAPS integration again.I tried to append the disableEndpointIdentification argument to the Keycloak run command, but I got another error:2020-09-04 11:56:38,112 ERROR [org.keycloak.services] (default task-1) KC-SERVICES0055: Error when authenticating to LDAP: [LDAP: error code 49 - 80090308: LdapErr: DSID-0C090434, comment: AcceptSecurityContext error, data 52e, v4563 ]:
To view this discussion on the web visit https://groups.google.com/d/msgid/keycloak-user/29bdb56b-cf02-418e-ab10-b19cb13c0690n%40googlegroups.com.
Hi Jan,
I can confirm that I had the wrong password on my end. Can't tell the difference between small L and capital i :/Anyways, thanks for your patience and support! I can now authenticate properly to the LDAPS server:
Now I tried to sync all users, but I got 0 users:I added a Custom User LDAP Filter of (objectClass=user) but the sync is still having 0 users.Any thoughts on this?
To view this discussion on the web visit https://groups.google.com/d/msgid/keycloak-user/1ec20251-e5a7-4e7f-b14a-8be0075748e5n%40googlegroups.com.
You received this message because you are subscribed to a topic in the Google Groups "Keycloak User" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/keycloak-user/06VTCNslXgY/unsubscribe.
To unsubscribe from this group and all its topics, send an email to keycloak-use...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/keycloak-user/da394f30-f27f-4e52-9226-2a41e5095f1bn%40googlegroups.com.
One thing I did when I set up Keycloak to my LDAPS back ends was install ldaputils on my application servers, and replicate the kinds of calls that Keycloak needed to make using the ldaputils command lines. It helped me rule out the Keycloak configuration problems I suspected, and found root cause problems with how LDAPS in java’s keystore demands not only a valid certificate matching the hostname, but for the signing CA to be in the ca-certificates of the application server’s operating system.
LDAPutils will give you much more usable output than Keycloak will.
e.g.
ldapwhoami -v -H ldaps://your.ldapsserver.hostname:636 -D 'cn=username,ou=Group Name,dc=Contoso,dc=local' -x -W
Kind Regards,
Joel
Now I tried to sync all users, but I got 0 users:
I added a Custom User LDAP Filter of (objectClass=user) but the sync is still having 0 users.
Any thoughts on this?
To view this discussion visit https://groups.google.com/d/msgid/keycloak-user/CAB__fcrLRK8_YxLfxEK_tcU74Ha3iNcsUUEQOj3jOEjtsi5ekQ%40mail.gmail.com.