Permanent fix provided in next build ADM 13.0-76.xx and above.
Workaround ::
=====================
Execute one of these commands in ADM CLI to overwrite Certificate attribute retrieval faulty code. Customers can keep the existing LDAP Settings, no need to change anything. External authentication should work correctly now over SSL/TLS Security.
For SSL
LDAPTLS_REQCERT=never ldapsearch -D CN=[service_account],CN=users,DC=lab,DC=com -H ldaps://[ldap_ip]:636 -b DC=lab,DC=com -A -o nettimeout=3 -w [passwd]
For TLS
LDAPTLS_REQCERT=never ldapsearch -D CN=[service_account],CN=users,DC=lab,DC=com -H ldap://[ldap_ip]:389 -b DC=lab,DC=com -Z -A -o nettimeout=3 -w [passwd]
To tailor the commands to any specific needs based on LDAP config, do from CLI “ldapsearch -?” for complete command details.
Options used
===========
ldapsearch is FreeBSD built-in command
-D binddn : bind DN
-H URI : LDAP Uniform Resource Identifier(s)
-b basedn : base dn for search
-Z : Start TLS request (-ZZ to require successful response)
-A : retrieve attribute names only (no values)
-o <opt>[=<optparam>] : general options
-w password
Customers can safely proceed and configure LDAP server with security type TLS/SSL. There wouldn’t be any impact.
Related: