How to update new certificates on LDAPWS used by ADFSxLogin

Given that both client certifificate and server certificate on LDAPWS which is inuse by ADFSxLogin have expired.

image01

image01

Above wizard does not allow you to access service any longer. You can do:

Certificate preration

  1. Generate two new certificates which are used as client certificate and server certificate for LDAPWS. In this sample, you can clone two self-signed certificates with Powershell from the currrent ones.

image01

  1. Open the certificate store:
  • Verify Read permission access to the private key of two new generated certificates are as same as the expired ones. Remove the expired certificates from LocalMachine\My store.
  • Export the public keys of two new generated certificates and import them to LocalMachine\Trusted Root Certificate Authorities.
  • Import the public key of client certificate to LocalMachine\Trusted People.

Update new certificates on LDAPWS

  • Access C:\Program Files\Safewhere\LdapWS\Tools\LdapConfiguration.xml, change the new thumbprint of service certificate in its tenant XML content.

image01

  • Access C:\Program Files\Safewhere\LdapWS\Tenants\#LDAPWSname\web.config, change the new thumbprint of server certificate in -ServiceServer section.
  • Reset LDAPWS application pool or reset IIS.
  • Execute the ADFSxLogin wizard again. Fill new certificate thumbprint values and press Test.

image01

Note: Support for LDAPWS flow has been deprecated since version 3.0.0.208. ADFSxLogin only supports LDAPDirecAccess on LDAP connection method.