AD Password Filter Setup - ldapbindssl.exe Fails yet Oracle SSL ldapbind works - SSL Hand Shake failed (NZerr 28862) (NZerr 29039)
(Doc ID 430907.1)
Last updated on AUGUST 30, 2023
Applies to:
Oracle Internet Directory - Version 10.1.4 and laterInformation in this document applies to any platform.
Symptoms
Reference: Oracle Identity Management Integration Guide 10g (10.1.4.0.1)
Part Number B15995-01
Chapter 20 Deploying the Oracle Password Filter for Microsoft Active Directory
Configuring and Testing Oracle Internet Directory with SSL Server-Side Authentication
In preparation for AD Password Filter setup, the ldapbindssl.exe tool fails, even though the Oracle ldapbind -U2 ssl bind succeeds.
The following may or may not be seen in the oidldapd01sXXXX.log (server log).
ERROR * gslsflnNegotiateSSL * SSL Hand Shake failed Source address: <IP ADDRESS>(<AD HOSTNAME>) * (NZerr 29039)
Changes
When the ldabindssl.exe is run on the AD host, an ssl handshake occurs during which the OID host presents his Server Certificate. The AD host then looks at the ISSUER of this certificate and checks to see if that issuer is listed in the Certificates Store under TRUSTED ROOT CERTIFICATION AUTHORITIES.
Therefore, you should have loaded your OID Trusted Root Certificate into the AD Host certificate store using the mmc command.
You should have used the Oracle Wallet Manager to EXPORT Trusted Certificate, then followed the documentation at the link below when loading it into the Active Directory host:
http://download.oracle.com/docs/cd/B28196_01/idmanage.1014/b15995/odip_adpasswordsync.htm#CHDHABAE
Cause
To view full details, sign in with your My Oracle Support account. |
|
Don't have a My Oracle Support account? Click to get started! |
In this Document
Symptoms |
Changes |
Cause |
Solution |
References |