Local LDAP Certificates¶

The local LDAP server by default serves both HTTPS on port 636 and HTTP on port 389.

The HTTPS server certificate is issued by cert-manager ClusterIssuer system-local-ca and is managed internally by cert-manager. The certificate will be automatically renewed when the expiration date approaches. The certificate is called system-openldap-local-certificate with its secret having the same name system-openldap-local-certificate in the deployment namespace. The server certificate and private key files are stored in the /etc/ldap/certs/ system directory.

In DC system, the LDAP service runs only in the central cloud. Clients in the subcloud (SSSD, LDAP client tools) are configured so that they can access the LDAP services in the central cloud using HTTPS. Thus, system-local-ca ClusterIssuer’s certificate is installed in the subcloud as a trusted CA certificate.

The insecure HTTP service is only supported for backward compatibility with subclouds running older versions of StarlingX that supports only HTTP. If no such subclouds are present, the insecure HTTP service can be disabled by system service parameter.

Run the following command to disable the insecure service:

~(keystone_admin)]$ system service-parameter-add identity local-openldap insecure_service=disabled

If the service parameter already exists, run the following command:

~(keystone_admin)]$ system service-parameter-modify identity local-openldap insecure_service=disabled

The insecure service can be enabled if it has been disabled. Run the following command to enable the insecure service:

~(keystone_admin)]$ system service-parameter-modify identity local-openldap insecure_service=enabled

After disabling or enabling the insecure local-openldap service, for the change to take effect, apply the service parameter by running the following command:

~(keystone_admin)]$ system service-parameter-apply identity --section local-openldap