To configure an LDAP authentication server with digital certificates
In the AMC, navigate to System Configuration > Authentication Servers.
Click New.
Under Authentication directory, click LDAP.
In the Name field, type a name for the authentication server.
Complete the information listed under General
If the LDAP server is listening on a something other than the well-known port (389 for
unencrypted LDAP connections, or 636 for SSL connections), specify a port number as a
colon-delimited suffix (for example, myldap.example.com:1300).
In the Password field, type the password used to establish a connection with the LDAP server.
ou=Users,o=xyz.com. The user
binding to the LDAP directory must have permissions to view the directory at this level.cn or
uid) to the corresponding ID in an LDAP directory, ensuring consistent identity information for authentication and authorization.Complete the information listed under Group lookup:
To secure the LDAP connection with SSL, complete the information under LDAP over SSL:
To secure the LDAP connection with SSL, select the Use SSL to secure LDAP connection checkbox.
View your certificate details and verify that the root certificate can be used by the appliance. See Importing CA Certificates for details.
To configure the appliance to verify that the LDAP host name is the same as the name in the certificate presented by the LDAP server, select the Match certificate CN against LDAP server name checkbox. Typically, your server name will match the name specified in its digital certificate. If this is the case with your server, SonicWall recommends enabling this option in a production environment. This makes it more difficult for an unauthorized server to masquerade as your LDAP server if your digital certificate or DNS server is compromised.
Optionally, complete the information listed under Advanced.
Click Save.