I purchased a SAN cert from Godaddy and am not sure what to do at this point. I have seen one answer that says to retup the request.inf as follows:
Subject="CN=DC1.YourDomain.local" ; enter FQDN here - must be FQDN not another name
ProviderName="Microsoft RSA SChannel Cryptographic Provider"
KeyUsage = 0xF0 ; Digital Signature, Key Encipherment, Nonrepudiation, Data Encipherment ; Alternative 0xA0 for DigSig & Key Encipher only
OID=18.104.22.168.22.214.171.124.1 ; Server Authentication
OID=126.96.36.199.188.8.131.52.2 ; Client Authentication
; OID=184.108.40.206.4.1.3220.127.116.11 ; Smart Card Logon - include even if you don't use SC right now ; comment out if going to a commercial CA - include if internally issued
; CertificateTemplate = WebServer ;Change to appropriate template name or OID ;Omit line if CA is a stand-alone CA or commercial or other non-MS CA
; SAN = "dns=server1.domain.local&dns=server1&dns=ldap.domain.local&dns=server1&ipaddress=192.168.0.1" ; do not include if submitting to commercial CA - purchase a SAN cert and fill in during the appropriate step
Not sure if I need everything or not, but I would love some input. Also, I am using the cert for SSO from an external server, so I am not sure that setting the cert up with the Subject being the local server name (Subject="CN=DC1.YourDomain.local") would work for me. I am guessing that I need to setup an external DNS entry for the LDAP server, and use the external name as my server name (Subject="CN=LDAP.YourExternalDomain.com". Is that correct? Also, if I have 2 LDAP servers on my network, one being the root DC and the other the backup DC, should I be setting this cert up for the backup DC? When I open up communication between the external server and my LDAP server, my firewall will be set to only allow LDAPS communication from their IP to my IP, which will hoepfully lock it down.