Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

LDAP using a self signed #40

Open
rgarrigue opened this issue Dec 7, 2018 · 1 comment
Open

LDAP using a self signed #40

rgarrigue opened this issue Dec 7, 2018 · 1 comment

Comments

@rgarrigue
Copy link

Hi

I'm trying to set up the LDAP auth against our server with a self-signed certificate. Which I guess explain this

[2018-12-07 08:16:55.889] [ERROR] console - Error: unable to verify the first certificate
    at TLSSocket.onConnectSecure (_tls_wrap.js:1122:34)
    at TLSSocket.emit (events.js:182:13)
    at TLSSocket.EventEmitter.emit (domain.js:441:20)
    at TLSSocket._finishInit (_tls_wrap.js:625:8)
RESTART!

I tried to add my certificate to the local CA ( CRT in /usr/local/share/ca-certificates/ldap01.crt + update-ca-certificates), didn't worked. I'll work on having a real certificate, but I wish I could allow self signed.

Best regards,

@jolly-jump
Copy link

Hi.
Long time since you reported this.
There is an (at the moment undocumented) option to add a server CA-certificate

"ldapauth": {
...
"tls_ca_file": "cacert.crt"

if you put your cacert.crt into the root-folder of etherpad-lite.

This worked for me.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants