LDAP-UX Client Services B.04.15 with Microsoft Windows Active Directory Server Administrator's Guide (edition 8)

Table Of Contents
6. The Netscape Directory CA certificate will be downloaded to the following two files on your
LDAP-UX Client:
/.mozilla/default/*.slt/cert8.db
/.morilla/default/*.slt/key3.db
7. You can simply copy the /.mozilla/default/*slt/cert8.db file to /etc/opt/ldapux/cert8.db and
/.mozilla/default/*slt/key3.db file to /etc/opt/ldapux/key3.db.
8. Set the file access permissions for /etc/opt/ldapux/cert8.db and /etc/opt/ldapux/key3.db to be read
only by root as follows:
-r-------- 1 root sys 65536 Jun 14 16:27 /etc/opt/ldapux/cert8.db
-r-------- 1 root sys 32768 Jun 14 16:27 /etc/opt/ldapux/key3.db
NOTE: For the multiple domain environment, you just need to download the certificate database
files, cert7.db or cert8.db and key3.db, from one domain, no additional action is required.
NOTE: You may use the unsupported /opt/ldapux/contrib/bin/certutil command line tool to create
the certificate database files, cert8.db and key3.db. For detailed command options and their
arguments, refer to Using the Certificate Database Tool available at
http://www.mozilla.org/projects/security/pki/nss/tools/certutil.html.
If your browser does not generate cert8.db and key3.db security database files, you must
export the certificate (preferably the root certificate of the Certificate Authority that signed the
LDAP server's certificate) from your certificate server as a Base64-Encoded certificate and use
the certutil utility to create the cert8.db and key3.db security database files.
Steps to create database files using the certutil utility
The following steps show you an example on how to create the security database files, cert8.db
and key3.db on your client system using the certutil utility:
1. Retrieve the Base64-Encoded certificate from the certificate server and save it.
For example, get the Base64-Encoded certificate from the certificate server and save it as the
/tmp/mynew.cert file. This file looks like:
--------------- BEGIN CERTIFICATE ------------------------------------
-MIICJjCCAY+gAwIBAgIBJDANBgkghkiG9w0BAQQFADBxMQswCQYDVQQGEwJVUzEL
MAkga1UECBMCQ2ExEjAQBgNVBAcTCWN1cGVvsG1ubzEPMA0GA1UEChmgAhaUy29T
MRIwEAYDVQQLEw1RR1NMLUxkYXAxHDAaBgNVBAMTE0N1cnRpzmljYXR1IE1hbmFn
4I2vvzz2i1Ubq+Ajcf1y8sdafuCmqTgsGUYjy+J1weM061kaWOt0HxmXmrUdmenF
skyfHyvEGj8b5w6ppgIIA8JOT7z+F0w+/mig=
--------------- END CERTIFICATE --------------------------------------
2. Use the rm command to remove the old database files, /etc/opt/ldapux/cert8.db and
/etc/opt/ldapux/key3.db:
rm -f /etc/opt/ldapux/cert8.db /etc/opt/ldapux/key3.db
3. Use the certutil utility with the -N option to initialize the new database:
/opt/ldapux/contrib/bin/certutil -N -d /etc/opt/ldapux
4. Add the Certificate Authority (CA) certificate or the LDAP server's certificate to the security
database:
Use the certutil command to add a CA certificate to the database:
For example, the following command adds the CA certificate, my-ca-cert, to the
security database directory, /etc/opt/ldapux, with the Base64-Encoded certificate
request file, /tmp/mynew.cert:
52 Installing LDAP-UX Client Services