commit 42f3743e4a70828a112e1855184fdb242784e2cf
Author: Stephen Wadeley <swadeley(a)redhat.com>
Date: Wed Mar 4 23:02:53 2015 +0100
change product name
en-US/OpenLDAP.xml | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
---
diff --git a/en-US/OpenLDAP.xml b/en-US/OpenLDAP.xml
index 1d64149..1022792 100644
--- a/en-US/OpenLDAP.xml
+++ b/en-US/OpenLDAP.xml
@@ -1089,7 +1089,7 @@ Re-enter new password:
<secondary>security</secondary>
</indexterm>
<para>
- OpenLDAP clients and servers can be secured using the Transport Layer Security
(TLS) framework. TLS is a cryptographic protocol designed to provide communication
security over the network. As noted above, OpenLDAP suite in Red Hat Enterprise Linux 7
uses Mozilla NSS as the TLS implementation.
+ OpenLDAP clients and servers can be secured using the Transport Layer Security
(TLS) framework. TLS is a cryptographic protocol designed to provide communication
security over the network. As noted above, OpenLDAP suite in Fedora uses Mozilla NSS as
the TLS implementation.
</para>
<para>
To establish a secure connection using TLS, obtain the required certificates as
described in <ulink
url="http://www.openldap.org/faq/index.cgi?file=1514"><ci...
pubwork="webpage">How do I use TLS/SSL with Mozilla
NSS</citetitle></ulink>. Then, a number of options must be configured on both
the client and the server. At a minimum, a server must be configured with the Certificate
Authority (CA) certificates and also its own server certificate and private key. The
clients must be configured with the name of the file containing all the trusted CA
certificates.