Mapp Services - LDAP and certificate management

When using the central user management sever feature of MpUserX, it is important to know that only the secure version of the protocol is supported LDAPs. The insecure version of it (LDAP) is not supported. The protocol is classified as obsolete and not supported by the main providers (AD from Microsoft).

When a connection is established to a central user management server, the certificate of the server needs to be validated to ensure that the server is a trusted partner. The solution today is to manually import the server certificate into the AR certificate store. The end-user would need to provide the certificate of their AD to the automation team and perform the update to the AR.

Is there any way to upload that certificate at runtime or does that have to be something that is done in AS with a transfer?

The ArCert library and the file transfer system of choice (FTP, USB, CIFS, etc.) can be used to import a new certificate to the certificate store. At this time, it requires some application work to implement the best solution for the machine.

To add some details to the original post, you need to include the certificate of the Certificate Authority (CA) that signs the Active Directory’s (AD) certificate in Automation Runtime (AR).

We have successfully managed to use LDAPS when utilizing a Windows server as the LDAP server. However, we have not been able to establish successful communication between a Linux-based LDAPs server and the PLC PPC80.

In our testing environment, we are using a ubuntu Linux server running a 389 LDAPS server. The server appears to be functioning correctly, as we can log into it using other applications (The same certificates base64 encoded), and the User Location DN is properly configured.

On the PLC side, we’ve verified connectivity using the IcmpPing() function, confirming that we can reach the server both by IP address and DN, which suggests that the HOST configuration is correct.

However, we are still facing issues with establishing communication. Are there any proven projects or procedures that we can follow to resolve this?

Hi @c531152
I had a similar problem with an OpenLDAP-Server on a Docker container, that creates an self-signed certificate.
The clue was to export not only the certificate from the server, but also the trust chain:

echo | openssl s_client -connect localhost:636 -showcerts | sed -n '/-----BEGIN CERTIFICATE-----/,/-----END CERTIFICATE-----/p' > ca-cert.pem

The resulting pem file included two or more certificates. After I imported that one in Automation Studio in “Third Party Certificates” the connection to the LDAP server was established.

Hope that helps.

Regards
Oli

2 Likes

Hello,

I must ask a seemingly foolish question: Since when has this existed?

It was always said that LDAP would never happen?!

3 Likes

Since mapp Services 5.10
Automation Help: mapp Services Version Information 5.10

1 Like

I’m not talking about central user management itself. I know that’s been around forever. But the option to use unencrypted LDAP must be fairly new. It was always said that this would never be available, that only LDAPS could be used.

In the documentation, this setting option is completely ignored as well — not a single word about it.

LDAP is an option available with the latest mapp Services version 6.4. We have added this option, since some customers had issues to set LDAPS up. Or their server did not support LDAPS.

And since we are offering LDAPS primarily, customer can decide to set it up in a “unsecure” way on their own risk. With LDAP.
We did not make any description in Help, since it should be pretty straghtforward, and we are planning to introduce LDAP with StartTLS with version 6.5 and at that time everything will be fully documented.

3 Likes