<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to 309: LDAPS (SSL/636) Invalid Credentials</title><link>https://sourceforge.net/p/phpipam/support-requests/309/</link><description>Recent changes to 309: LDAPS (SSL/636) Invalid Credentials</description><atom:link href="https://sourceforge.net/p/phpipam/support-requests/309/feed.rss" rel="self"/><language>en</language><lastBuildDate>Fri, 18 Nov 2022 16:29:48 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/phpipam/support-requests/309/feed.rss" rel="self" type="application/rss+xml"/><item><title>LDAPS (SSL/636) Invalid Credentials</title><link>https://sourceforge.net/p/phpipam/support-requests/309/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;LDAPS (SSL/636) Invalid Credentials&lt;/p&gt;
&lt;p&gt;I implemented LDAP authentication which works great over 389, however I cannot get it to work on SSL/636 . &lt;/p&gt;
&lt;p&gt;Installes allDC+Root certificates to the server . Testing with openssl  without issues&lt;/p&gt;
&lt;p&gt;Is the a way to enmforce the ldap connection oir a workaorund.   we recently upgraded to the lastest version btw.&lt;/p&gt;
&lt;p&gt;Thanks&lt;br/&gt;
marcus&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Anonymous</dc:creator><pubDate>Fri, 18 Nov 2022 16:29:48 -0000</pubDate><guid>https://sourceforge.netba3a600e2ba83cf5a8939738c130cb08a596c674</guid></item></channel></rss>