On Tue, 2022-01-11 2:04 PM, C R wrote:
> I suspect adding the java property
> "-Dcom.sun.jndi.ldap.object.disableEndpointIdentification=true" may
> work. Another option may add the CA at runtime by adapting the
> entrypoint script.
>
> C.
>
> Le mar. 11 janv. 2022 à 12:11, Todor Petkov <
petkov...@gmail.com> a écrit :
>>
>> Hello,
>>
>> I am running Keycloak 13 in Kubernetes and I need to add connection to
>> LDAP(s) server. The server in question has invalid certificate and
>> Keycloak refuses to connect with message "ERROR [org.keycloak.services]
>> (default task-392) KC-SERVICES0055: Error when authenticating to LDAP:
>> simple bind failed: ldapserver.domain:636:
>> javax.naming.CommunicationException: simple bind failed:
>> ldapserver.domain:636 [Root exception is
>> javax.net.ssl.SSLHandshakeException: PKIX path building failed:
>> sun.security.provider.certpath.SunCertPathBuilderException: unable to
>> find valid certification path to requested target]"
>>
>> Is there a way to allow Keycloak to connect to the server without
>> checking the certificate by adding an environment variable? I don't want
>> to rebuild the image to add the server certificate in the store.
Unfortunately, it still gives the error. I added the following properties