The ldap users certificates signed by the SoCS Certificate Authority for SSL/TLS Connections. They must be renewed periodically. Modern certificates no longer use common name (CN), and prefer subject alternative name (SAN). Rancher will not allow login without SAN cert. Use the following same req.conf to create a config file for each certificate (replace peeves are required).
[req] distinguished_name = req_distinguished_name x509_extensions = v3_req prompt = no [req_distinguished_name] C = CA ST = ON L = Guelph O = University of Guelph OU = School of Computer Science CN = peeves.socs.uoguelph.ca [v3_req] keyUsage = keyEncipherment, dataEncipherment extendedKeyUsage = serverAuth subjectAltName = @alt_names [alt_names] DNS.1 = peeves.socs.uoguelph.ca
openssl x509 -req -in ldapserver.csr -CA socs-cacert.pem -CAkey socsCA.key -CAcreateserial -out ldapserver.crt -days 500 -extfile req.conf -extensions 'v3_req'
# AUTO-GENERATE-FILE ... # CRC32 #########
ldapvi -h ldap:/// -D cn=admin,cn=config -w <ldap_password> -b dc=config
ldapmodify -H ldapi:/// -x -D cn=admin,dc=config -W -f <path_to_ldif_file>
ldapvi -h peeves.socs.uoguelph.ca -D cn=admin,dc=socs,dc=uoguelph,dc=ca