LDAP-UX Client Services B.04.10 with Microsoft Windows Active Directory Server Administrator's Guide

-r-------- 1 root sys 65536 Jun 14 16:27 /etc/opt/ldapux/cert8.db
-r-------- 1 root sys 32768 Jun 14 16:27 /etc/opt/ldapux/key3.db
NOTE: For the multiple domain environment, you just need to download the certificate database
files, cert7.db or cert8.db and key3.db, from one domain, no additional action is required.
NOTE: You may use the unsupported /opt/ldapux/contrib/bin/certutil command line tool to create
the certificate database files, cert8.db and key3.db. For detailed command options and their
arguments, refer to Using the Certificate Database Tool available at
http://www.mozilla.org/projects/security/pki/nss/tools/certutil.html.
If your browser does not generate cert8.db and key3.db security database files, you must
export the certificate (preferably the root certificate of the Certificate Authority that signed the
LDAP server's certificate) from your certificate server as a Base64-Encoded certificate and use
the certutil utility to create the cert8.db and key3.db security database files.
Steps to create database files using the certutil utility
The following steps show you an example on how to create the security database files, cert8.db
and key3.db on your client system using the certutil utility:
1. Retrieve the Base64-Encoded certificate from the certificate server and save it.
For example, get the Base64-Encoded certificate from the certificate server and save it as the
/tmp/mynew.cert file. This file looks like:
--------------- BEGIN CERTIFICATE ------------------------------------
-MIICJjCCAY+gAwIBAgIBJDANBgkghkiG9w0BAQQFADBxMQswCQYDVQQGEwJVUzEL
MAkga1UECBMCQ2ExEjAQBgNVBAcTCWN1cGVvsG1ubzEPMA0GA1UEChmgAhaUy29T
MRIwEAYDVQQLEw1RR1NMLUxkYXAxHDAaBgNVBAMTE0N1cnRpzmljYXR1IE1hbmFn
4I2vvzz2i1Ubq+Ajcf1y8sdafuCmqTgsGUYjy+J1weM061kaWOt0HxmXmrUdmenF
skyfHyvEGj8b5w6ppgIIA8JOT7z+F0w+/mig=
--------------- END CERTIFICATE --------------------------------------
2. Use the rm command to remove the old database files, /etc/opt/ldapux/cert8.db and
/etc/opt/ldapux/key3.db:
rm -f /etc/opt/ldapux/cert8.db /etc/opt/ldapux/key3.db
3. Use the certutil utility with the -N option to initialize the new database:
/opt/ldapux/contrib/bin/certutil -N -d /etc/opt/ldapux
4. Add the Certificate Authority (CA) certificate or the LDAP server's certificate to the security
database:
Use the certutil command to add a CA certificate to the database:
For example, the following command adds the CA certificate, my-ca-cert, to the
security database directory, /etc/opt/ldapux, with the Base64-Encoded certificate
request file, /tmp/mynew.cert:
/opt/ldapux/contrib/bin/certutil -A -n my-ca-cert -t "C,," -d
/etc/opt/ldapux -a -i /tmp/mynew.cert
52 Installing LDAP-UX Client Services