I have configured the LDAP Generic Connector in ISC towards an OpenLDAP (2.4.31) source.
Unfortunately my clients OpenLDAP only supports TLSv1.2 along with some of the ciphers in the ciphers suite used with that version. Currently the test connection fails during handshaking process. Testing connection by setting the TLS-version and cipher explicitly with toolbox openssl on the VA solves the problem.
Questions:
Is it possible to specify on the VA which TLS version to use for a specific source?
Is it possible to specify on the VA which cipher suite to use for a specific source?
I would want to use this configuration:
TLS version: TLSv1.2
Cipher: AES256-SHA256 (cipher is TLS_RSA_WITH_AES_256_CBC_SHA256)
I’m using a self-signed certificate from the LDAP-server that I have imported in /home/sailpoint/certificates/ and then restarted ccg.
Running “openssl s_client -connect serverfqdn:636 -tls1_2 -cipher AES256-SHA256” works from the VA so everything seems to be open between VA and LDAP-server.
Update: I was mistakenly believing that TLSv1.2 and AES256-SHA256 was not used from the VA but it does, it is probably negotiated between client and server.
I re-imported the certificate under /home/sailpoint/certificates and restarted ccg again and now it works.