Manual Chapter :
Securing Client-Side and Server-Side LDAP Traffic
Applies To:
Show Versions
Securing Client-Side and Server-Side LDAP Traffic
Overview: Securing LDAP traffic with STARTTLS encryption
You can configure STARTTLS encryption for Lightweight Directory Access
Protocol (LDAP) traffic passing through the BIG-IP system.
LDAP
is an industry standard application protocol for accessing and maintaining
distributed directory information services over an Internet Protocol (IP) network.You configure the BIG-IP system for STARTTLS encryption by configuring
Client LDAP and Server LDAP profiles to activate the STARTTLS communication protocol for
any client or server traffic that allows or requires STARTTLS encryption.
Normally, LDAP traffic between LDAP servers and clients is unencrypted.
This creates a privacy issue because LDAP traffic often passes through routers that the
servers and clients do not trust, resulting in a third party potentially changing the
communications between the server and client. Also, two LDAP systems do not normally
authenticate each other. A more secure LDAP server might only allow communications from
other known LDAP systems, or the server might act differently with unknown systems.
To mitigate these problems, the BIG-IP system includes two LDAP profiles
that you can configure. When you configure a Client LDAP or Server LDAP profile, you can
instruct the BIG-IP system to activate the STARTTLS communication protocol for any client
or server traffic that allows or requires STARTTLS encryption. The
STARTTLS
protocol effectively upgrades a plain-text
connection to an encrypted connection on the same port (port 389), instead of using a
separate port for encrypted communication.This illustration shows a basic configuration of a BIG-IP system that
activates STARTTLS to secure LDAP traffic between a client system and the BIG-IP system,
and between the BIG-IP system and an LDAP authentication server.
Sample BIG-IP configuration for LDAP traffic with STARTTLS
activation
