When deploying IMC UAM Radius server, the installation will probably integrate with the Active Directory at the customer through the LDAP protocol.

IMC UAM will use LDAP to synchronize user objects, so the IMC UAM Administrator can apply specific network access services to these user objects.

When using 802.1x with PEAP MSCHAPv2 authentication, an additional service on the IMC server will provide the authentication. This service will ‘join’ the domain, but that is something for a different post.

Once the users have been synchronized with UAM, these users can login on the SelfService Portal (http://imc:8080/selfservice ), where they could perform actions like guest management or BYOD device registration.



The problem : Passwords in clear text on the wire …

The user password cannot be synchronized by UAM, since AD does not allow reading user passwords. So when an LDAP user logs in on the SelfService portal, UAM will check the username and password on the fly with the AD.

This password check is done by a simple LDAP bind to the AD, using the provided credentials. And as you may expect, simple LDAP means clear text.

This is the trace of a user with username “m1” and password “password1.”

uam-sldap-simple - clear text.pcapng_2013-12-27_13-21-54

The solution : Secure LDAP

UAM supports the configuration of secure LDAP. Support for Secure LDAP (tcp port 636) must first be available on the AD Server.

This is actually very easy : when the AD Server has a valid certificate for server authentication, it will enable support for secure LDAP automatically using that certificate. So by installing an Enterprise CA, domain controllers should get a server authentication certificate or the admin can manually request a domain controller certificate of course.

On the UAM side, the AD certificate must be checked, so the Root certificate (which has signed the certificate used by the domain controller for secure LDAP) must be linked to the LDAP Server object. This requires the root certificate file to be exported as a .der file.

uam-sldap-ldapcert uam-sldap-ldapcert2uam-sldap-ldapcert3

Once the root certificate has been linked to the LDAP server, the SSL option can be enabled and tested.



With this new configuration, the user login will be encrypted over the network with SSL.


So while this is not a default option, I would strongly recommend to activate it for obvious reasons.

This entry was posted in IMC UAM and tagged , . Bookmark the permalink.

5 Responses to IMC UAM Secure LDAP

  1. Pingback: HP IMC TACACS Authentication Manager – AD/LDAP link | About HP Networking

  2. Jorge says:

    Great Article!!!! It helped me to clarify the concepts for the implementation of LDAP within of UAM module.

    I would like to ask for your help. I have a doubt in the stage of LDAP sync, I need to sync a users within security group,with a DN:CN=wifi,OU=Usuarios registrados,DC=XXX,DC=cl

    I wrote the DN DC=XX,DC=cl in Sub-base DN, and configure the filter:

    (&(sAMAccountName=*)(memberOf=CN=wifi,OU=Usuarios registrados,DC=XXX,DC=cl))

    But I obtain an error that there are no users that match with this rule

    you know how to do this filter?, I try to find information of this, but i had no success.

    In advance, thank for your support again,

  3. Pedro L says:


    First of all thank you for the great blog you have set up here. Lots of juicy information.

    If I understood properly, there are two moments where the credentials are crossing the network:
    1st – When the user fills the credentials on the HTTP self-service portal and then sends them to UAM
    2nd – When UAM forwards the credentials to the LDAP server using secure LDAP as explained in this post

    If I understood correctly, on the 1st exchange the credentials are crossing the network in clear text. Is this true ? And if so I imagine the solution would be to use HTTPS instead of HTTP.

    I’m asking this because I’m having a challange with UAM based HTTPS BYOD portal with self-signed server certificates not supported by IPhones, unless you install them on the device (not really BYOD then).I was wondering if this was a solution to secure the credentials instead of using HTTPS.


    • Hi Pedro,

      I am aware of 2 options:
      1/ HTTPS: since the uam byod portal is typically installed on a dedicated server (you typically do not want the main IMC network management system to be reachable by the users), so you can *simply* change the certificate used on that server, without impacting the certificate of the main imc server.
      2/ use alternate credentials: When importing users from the AD, you can create alternative accounts, and import e.g. the employee id, so that ID can be used as the BYOD password. This avoids having the user enter the corporate password in the initial portal for device registration. (but even then I would recommend HTTPS).

      best regards,Peter

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s