Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

LDAPS: Add possibility to UI to upload selfsigned certificates #607

Open
hurradieweltgehtunter opened this issue Dec 15, 2020 · 3 comments
Assignees

Comments

@hurradieweltgehtunter
Copy link
Contributor

While talking about a LDAP app integration we came across an issue with self-signed certificates.
According to the information I received it is very common to use self-signed certificates when running an LDAPS-Server.
The current app UI does not offer a possibility to upload this kind of certificate for further processing on requests.

This issue is about adding this possibility.

The scope of the discussion only refers to using the LDAP app in the official docker environment, meaning, that the upload should only be possible if in a docker environment.

More details can be provided by @hodyroff
FYI @micbar

@DeepDiver1975
Copy link
Member

The current app UI does not offer a possibility to upload this kind of certificate for further processing on requests.

This issue is about adding this possibility.

one does not simply upload a certificate - but the certificate of the ca ;-)

owncloud has already a mechanism in place to upload ca certificates - it has to be analyzed if this cert store is already used in ldap or not.

no need to manage yet another cert store in ldap.

@hodyroff
Copy link

https://doc.owncloud.com/server/10.6/admin_manual/configuration/server/import_ssl_cert.html#site-wide-ssl-import
Check if this already solves the problem and if LDAP uses it.

@hurradieweltgehtunter
Copy link
Contributor Author

hurradieweltgehtunter commented Dec 16, 2020

Thank you for the information. Sorry about possible n00b questions, this stuff is not my profession :)
We will test if this works for LDAP.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants