You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@directory.apache.org by el...@apache.org on 2017/01/02 18:39:28 UTC

svn commit: r1776976 - /directory/site/trunk/content/api/user-guide/5.1-ssl.mdtext

Author: elecharny
Date: Mon Jan  2 18:39:28 2017
New Revision: 1776976

URL: http://svn.apache.org/viewvc?rev=1776976&view=rev
Log:
Added some doco about SSL

Modified:
    directory/site/trunk/content/api/user-guide/5.1-ssl.mdtext

Modified: directory/site/trunk/content/api/user-guide/5.1-ssl.mdtext
URL: http://svn.apache.org/viewvc/directory/site/trunk/content/api/user-guide/5.1-ssl.mdtext?rev=1776976&r1=1776975&r2=1776976&view=diff
==============================================================================
--- directory/site/trunk/content/api/user-guide/5.1-ssl.mdtext (original)
+++ directory/site/trunk/content/api/user-guide/5.1-ssl.mdtext Mon Jan  2 18:39:28 2017
@@ -3,7 +3,7 @@ NavPrev: 5-ldap-security.html
 NavPrevText: 5 - LDAP Security
 NavUp: 5-ldap-security.html
 NavUpText: 5 - LDAP Security
-NavNext: 5.23-start-tls.html
+NavNext: 5.2-start-tls.html
 NavNextText: 5.2 - StartTLS
 Notice: Licensed to the Apache Software Foundation (ASF) under one
     or more contributor license agreements.  See the NOTICE file
@@ -24,4 +24,25 @@ Notice: Licensed to the Apache Software
 
 # 5.1 - SSL
 
->**Note:** Contents for this page will be added soon...
\ No newline at end of file
+**LDAP** supports **SSL**, it's called **LDAPS**, and it uses a dedicated port. As of today, and since 2000, **LDAPS** is deprecated and **StartTLS** should be used.
+
+That being said, many servers accept **LDAPS**, and the Apache LDAP API supports it.
+
+## How does it work ?
+
+The **SSL** protocol ensures that data are transmitted encrypted, and guarantees that the data being received are valid. Nobody can capture those data and read them, assuming the ciphers being used are strong enough.
+
+With **SSL**, a dialog between the client and the server occurs, and when both part agree on the cipher to use, then all subsequent data is encrypted. This dialog may include a mutual validation. 
+
+## Protocols
+
+There are many version that can be used, but the idea is to use tha most recent one, if the server supports it. In any case, as we depend on **Java**, we are also limited by the supported version on the client side. Here are all the existing version, and their status :
+
+| SSL | Java 7 | Java 8 |
+| version | Client | Server | Client | Server |
+|---|---|---|---|---|
+| 2.0 | N/A | N/A | N/A | N/A |
+| 3.0 | Disabled | Disabled | N/A | N/A |
+| 3.1 (aka TLSv1) | Enabled | Enabled | Enabled | Enabled |
+| 3.2 (aka TLSv1.1 | Disabled | Enabled | Enabled | Enabled |
+| 3.3 (aka TLSv1.2) | Disabled | Enabled | Enabled | Enabled |