Loading

How to configure LDAPS on LDAP policy

Publiceringsdatum: Aug 1, 2025
Uppgift

GOAL

This knowledge base article explains how to configure your LDAP policy to connect to an LDAPS server. 
 
Steg

When creating the LDAP policy you need to configure the LDAP URL field with your LDAPS URL in the following format: 
 
ldaps://my-company-ldap.cloudhub.io:1010/

Notice that the url starts with ldaps:// also you need to use the port that is configured in your ldap server. 

The second thing that needs to be taken into account is that you might need to trust the certificates you LDAPS server has. Given the policy doesn't have its own truststore configuration, so it will use the default cacerts truststore from the jvm that is running the API that has this policy applied.
If you server certificates are signed by any of the certificate authorities that the default truststore has, you won't need to add the LDAPS Server's certificate to the cacerts.
In the other hand, if your LDAPS server is using a self-signed certificate or is signed by a non-trusted CA, you will need to add the certificates to the JVM's cacerts
* Adding certificates to the JVM's cacerts is ONLY supported for stand-alone Mule Runtime Server

To install the certificate on your cacerts file you need to: 
  1. Download the certificate
  2. Import the Trusted Certificate into your cacerts truststore, using following command:
     
    keytool -import -trustcacerts -keystore$JAVA_HOME/jre/lib/security/cacerts -storepass changeit -alias myTrustedCert -import -file trustedCertificate.txt

    Note: Depending on the different versions of JDK, the cacerts truststore may be in different locations.


For more information about the LDAP Policy, please check the following documentation: https://docs.mulesoft.com/api-manager/2.x/basic-authentication-ldap-concept
 
Knowledge-artikelnummer

001117166

 
Laddar
Salesforce Help | Article