===== pki setup / ldaps-certificate =====
### create a CA on fed10
vi /etc/pki/tls/openssl.cnf
# set 'dir = /etc/pki/tls'
touch /etc/pki/tls/index.txt
mkdir /etc/pki/tls/newcerts
echo 01 >/etc/pki/tls/serial
cd /etc/pki/CA
umask 077
openssl genrsa -out private/cakey.pem -des3 2048
openssl req -new -x509 -key private/cakey.pem -days 3650 >cacert.pem
### create ldap-server cert, on ldapserver
mkdir /etc/openldap
cd /etc/openldap
umask 077
openssl genrsa 1024 >slapd.key
openssl req -new -key slapd.key -out slapd.csr
# openssl req -in slapd.csr -noout -text # see contents of request
cp slapd.csr /etc/pki/tls
cd /etc/pki/tls
openssl ca -in slapd.csr -out slapd.crt
cp slapd.crt cacert.pem /etc/openldap
===== openldap setup =====
yum install openldap-server openldap-clients
cd /etc/openldap
chown ldap cacert.pem slapd.crt slapd.key
chmod 400 cacert.pem slapd.crt slapd.key
vi slapd.conf
# make sure core, cosine, nis and inetorgperson schema files are included, and ensure these settings:
TLSCACertificateFile /etc/openldap/cacert.pem
TLSCertificateFile /etc/openldap/slapd.crt
TLSCertificateKeyFile /etc/openldap/slapd.key
database bdb
suffix "dc=fluxcoil,dc=net"
rootdn "cn=Manager,dc=fluxcoil,dc=net"
rootpw secret
---------------------------
cp /usr/share/doc/openldap-servers-*/DB_CONFIG.example /var/lib/ldap/DB_CONFIG
chkconfig ldap on
service ldap start
===== openldap filling =====
cat >initial.ldif <