
ADOBE CONNECT ENTERPRISE SERVER 6
Installation and Configuration Guide
42
Data flow in a public key infrastructure
This example assumes the following:
• Connect Enterprise Server is installed.
• Connect Enterprise Server is integrated with an LDAP directory service.
• A user imported from the LDAP directory service can enter a meeting served by Connect Enterprise.
• An F5 router is installed.
1. Configure the LDAP directory server.
An LDAP email attribute must be specified for each user. This attribute is added to the subject field of the client
certificate.
The F5 iRule parses the X.509::subject for the e-mail address and inserts the value into the HTTP header that
Connect Enterprise uses to authenticate the user.
Note: This example uses the
email attribute, but you could use any unique identifier that is exposed by the X.509 format,
has a length of 254 characters or less, and is shared by the LDAP directory service and Connect Enterprise.
2. Set the Connect Enterprise login policy.
Connect Enterprise should use an e-mail address for user login. In Enterprise Manager, select the Administration
tab, then click Users and Groups, the click Edit Login and Password Policies.
3. Configure a CA server.
The CA (Certification Authority) server handles requests for certificates, verifies client identities, issues certificates,
and manages a CRL (client revocation list).
In this implementation, the CA points to the LDAP directory server to obtain a client certificate. The CA queries the
LDAP server for the client information and, if it exists and hasn’t been revoked, formats it into a certificate.
Verify that the client certificate is installed and usable by looking at the subject field. It should look something like this:
F5 BIG-IP router
Client
Connect Enterprise
Server
SQL Server
LDAP directory
server
Certicate server
Comentários a estes Manuais