This article explains how to integrate SonicWall appliance with an LDAP directory service, such as Windows Active Directory, using SSL/TLS.
A prerequisite is configuring the Domain Controller (DC) server for certificate management so that it can establish SSL/TLS sessions with the SonicWall appliance. To achieve this, one has to install the certificate, e.g, mycert.pfx on the DC. Such a file has both the private key and public key certificate. While one can purchase a certificate from a public Certificate Authority (CA), self-signed certificates can be created on a CA in Active Directory Certificate Services or OpenSSL and used for this purpose.
Next, you should configure the SonicWall appliance for LDAP over SSL/TLS. Additionally, you may consider exporting the public key certificate from the DC and import it to the SonicWall Appliance.
NOTE: In this article we have used Windows 2003 server for Certificate Authority and Active Directory. If you are using windows server other than 2003 please check Microsoft site for configuring CA and Active directory, however the steps on the SonicOS Enhanced remains the same.
The following procedures describe how to Configure LDAP over TLS.
Configuring the CA on the Active Directory (Windows 2003 Server)
To configure the CA on the Active Directory server (skip the first five steps if Certificate Services are already installed)
Exporting the CA Certificate from the Active Directory Server
To export the CA certificate from the AD server
Importing the CA Certificate onto the SonicWall
To import the CA certificate onto the SonicWall:
Configuring LDAP settings on SonicWall Appliance
NOTE: That this is the user's display name, not their login ID.
On the Schema tab
On the Directory tab
NOTE: If you want your previous tree to be appended please choose so in the last option.
In the Genera Settings tab of LDAP Configuration window: select
On the Users & Groups tab
Test
Further Reading: