Lenovo RD220 User Guide - Page 45

Secure Web server and secure LDAP, SSL certificate overview, SSL Client Configuration for LDAP Client

Page 45 highlights

a. Disable the SSL client. Use the SSL Client Configuration for LDAP Client area on the Security page. b. Generate or import a certificate. Use the SSL Client Certificate Management area on the Security page (see "SSL client certificate management" on page 43). c. Import one or more trusted certificates. Use the SSL Client Trusted Certificate Management area on the Security page (see "SSL client trusted certificate management" on page 43). d. Enable the SSL client. Use the SSL Client Configuration for LDAP Client area on the Security page (see "Enabling SSL for the LDAP client" on page 44). 3. Restart the IMM for SSL server configuration changes to take effect. For more information, see "Restarting IMM" on page 47. Note: Changes to the SSL client configuration take effect immediately and do not require a restart of the IMM. Secure Web server and secure LDAP Secure Sockets Layer (SSL) is a security protocol that provides communication privacy. SSL enables client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, and message forgery. You can configure the IMM to use SSL support for two types of connections: secure server (HTTPS) and secure LDAP connection (LDAPS). The IMM takes on the role of SSL client or SSL server depending on the type of connection. The following table shows that the IMM acts as an SSL server for secure Web server connections. The IMM acts as an SSL client for secure LDAP connections. Table 5. IMM SSL connection support Connection type SSL client Secure Web server Web browser of the user (HTTPS) (For example: Microsoft Internet Explorer) Secure LDAP IMM LDAP client connection (LDAPS) SSL server IMM Web server An LDAP server You can view or change the SSL settings from the Security page. You can enable or disable SSL and manage the certificates that are required for SSL. SSL certificate overview You can use SSL with either a self-signed certificate or with a certificate that is signed by a third-party certificate authority. Using a self-signed certificate is the simplest method for using SSL, but it does create a small security risk. The risk arises because the SSL client has no way of validating the identity of the SSL server for the first connection that is attempted between the client and server. It is possible that a third party might impersonate the server and intercept data that is flowing between the IMM and the Web browser. If, at the time of the initial connection between the browser and the IMM, the self-signed certificate is imported into the certificate store of the browser, all future communications will be secure for that browser (assuming that the initial connection was not compromised by an attack). For more complete security, you can use a certificate that is signed by a certificate authority. To obtain a signed certificate, use the SSL Certificate Management page Chapter 3. Configuring the IMM 39

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120

a.
Disable the SSL client. Use the
SSL Client Configuration for LDAP Client
area on the Security page.
b.
Generate or import a certificate. Use the
SSL Client Certificate
Management
area on the Security page (see “SSL client certificate
management” on page 43).
c.
Import one or more trusted certificates. Use the
SSL Client Trusted
Certificate Management
area on the Security page (see “SSL client trusted
certificate management” on page 43).
d.
Enable the SSL client. Use the
SSL Client Configuration for LDAP Client
area on the Security page (see “Enabling SSL for the LDAP client” on page
44).
3.
Restart the IMM for SSL server configuration changes to take effect. For more
information, see “Restarting IMM” on page 47.
Note:
Changes to the SSL client configuration take effect immediately and do
not require a restart of the IMM.
Secure Web server and secure LDAP
Secure Sockets Layer (SSL) is a security protocol that provides communication
privacy. SSL enables client/server applications to communicate in a way that is
designed to prevent eavesdropping, tampering, and message forgery.
You can configure the IMM to use SSL support for two types of connections: secure
server (HTTPS) and secure LDAP connection (LDAPS). The IMM takes on the role
of SSL client or SSL server depending on the type of connection. The following
table shows that the IMM acts as an SSL server for secure Web server connections.
The IMM acts as an SSL client for secure LDAP connections.
Table 5. IMM SSL connection support
Connection type
SSL client
SSL server
Secure Web server
(HTTPS)
Web browser of the user
(For example: Microsoft Internet Explorer)
IMM Web server
Secure LDAP
connection (LDAPS)
IMM LDAP client
An LDAP server
You can view or change the SSLsettings from the Security page. You can enable or
disable SSL and manage the certificates that are required for SSL.
SSL certificate overview
You can use SSL with either a self-signed certificate or with a certificate that is
signed by a third-party certificate authority. Using a self-signed certificate is the
simplest method for using SSL, but it does create a small security risk. The risk
arises because the SSL client has no way of validating the identity of the SSL server
for the first connection that is attempted between the client and server. It is
possible that a third party might impersonate the server and intercept data that is
flowing between the IMM and the Web browser. If, at the time of the initial
connection between the browser and the IMM, the self-signed certificate is
imported into the certificate store of the browser, all future communications will be
secure for that browser (assuming that the initial connection was not compromised
by an attack).
For more complete security, you can use a certificate that is signed by a certificate
authority. To obtain a signed certificate, use the SSL Certificate Management page
Chapter 3. Configuring the IMM
39