Cool Solutions

Configuring Proxies between ZENworks Mobile Workspace, a GroupWise Server, and an LDAP Source



By:

May 4, 2018 9:11 am

Reads:906

Comments:0

Score:5

Print/PDF

Objective

This document provides information on how to configure proxies between ZENworks Mobile Workspace, a GroupWise server, and an LDAP source using an Nginx and an LDAP Proxy, respectively.

Prerequisites

  • The Nginx Proxy should be installed. For information on how to install the Nginx Proxy click here.
  • The NetIQ LDAP Proxy should be installed. For information on how to install the NetIQ LDAP Proxy click here.
  • The ZENworks Mobile Workspace server should be able to communicate with the respective Proxy Servers on the designated ports.
  • The SSL ports 443 (mail server SOAP request to Nginx) and 636 (LDAPS communication) should be open for the ZENworks Mobile Workspace server to communicate with devices running the proxy service.

Configuring the Nginx Proxy

  1. Add the following lines to the nginx.conf file:
server {

        listen       443 ssl;

        server_name  nginx_proxy.company.com;

        ssl_session_timeout  5m;



        ssl_certificate      /etc/ssl/certs/nginx_proxy_certificate.cer;

        ssl_certificate_key  /etc/ssl/private/nginx_proxy.key;



        location /soap {

                proxy_pass    https://mailserver.company.com:7191;

                proxy_ssl_trusted_certificate   /etc/nginx/sslcerts/mailserver.cer;

                proxy_ssl_verify              on;

        }

    }


In the lines listed above, specify the relevant values for the following parameters:

  • listen: listening port number
  • server name: Nginx Proxy host name
  • ssl certificate: location of the Nginx Proxy certificate
  • ssl certificate key : location of the Nginx Proxy key
  • proxy pass: soap mail URL and soap port on which the GroupWise server is configured
  • proxy ssl trusted certificate: location of the GroupWise server certificate
  • proxy ssl verify: on/off

Save the nginx.conf file and restart the nginx service.

Configuring the LDAP Proxy

Edit the nlpconf.xml file to configure the LDAP Proxy

Configuring the Listeners 

Listeners are the network interfaces on which LDAP Proxies listen for incoming requests. Using the proxy you can configure any number of listeners to listen on multiple interfaces. To configure a listener on a secure port, perform the following steps:

  1. Configure the LDAP Proxy listener with an X.509 certificate.
  2. Export the library path by using the /opt/novell/ldapproxy/bin/nlppath command.
  3. Import the certificates and keys present in the PKCS#12files by using the nlpcert utility: nlpcert -i ldap_proxy_cert.pfx -o private-cert.pem
  4. Copy the private-cert.pem to the /etc/opt/novell/ldapproxy/conf/ssl/private/ directory and ensure that the content within the nlpconf.xml is as follows:
    <listener id-listener="listener1">
    
       <service protocol="ldaps">
    
          <addr-ipv4>0.0.0.0</addr-ipv4>
    
          <port>636</port>
    
       </service>
    
       <certificate-file-name>private-cert.pem</certificate-file-name>
    
       <ref-policy-connection-route>conn-route-policy</ref-policy-connection-route>
    
    </listener>

For more information about Listeners click here.

Configuring the Back- End Server

A back-end server is a directory server to which the LDAP Proxy Server is connected. To configure a back-end server on a secure port, perform the following steps:

  1. Obtain the root CA certificate in the pem format and copy it to the /etc/opt/novell/ldapproxy/conf/ssl/trustedcert/
  2. Replace x.x.x.x within the <addr-ipv4> tags with your LDAP server IP address and ensure that the content within the  nlpconf.xml is as follows:
    <list-backend-server health-check-interval-secs="60">
    
           <backend-server id-backend-server="Backend1">
    
                 <service protocol="ldaps">
    
                        <addr-ipv4>x.x.x.x</addr-ipv4>
    
                        <port>636</port>
    
                 </service>
    
           </backend-server>
    
    </list-backend-server>
  3. Save the nlpconf.xml file and restart the nlpd service.

For more information about back-end servers click here.

For verification you need to follow these steps:

  1. Configure ZENworks Mobile Workspace LDAP with the LDAP Proxy i.e. ldap_proxy.company.com and verify that authentication goes through.
  2. In ZENworks Mobile Workspace, navigate to Domain >PIM and add the Nginx Proxy hostname, i.e. nginx_proxy.company.com, as the  GroupWise server.
  3. Enroll a device to ZENworks Mobile Workspace and check if mails are being received.

 

1 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 5 (1 votes, average: 5.00 out of 5)
You need to be a registered member to rate this post.
Loading...

Tags:
Categories: Configuration Management, GroupWise, Mobile, Mobility, Unified Endpoint Management, ZENworks, ZENworks Configuration Management, ZENworks Mobile Workspace

0

Disclaimer: This content is not supported by Micro Focus. It was contributed by a community member and is published "as is." It seems to have worked for at least one person, and might work for you. But please be sure to test it thoroughly before using it in a production environment.

Comment

RSS