Frequently, vendors request an LDAP server's SSL certificate chain to import into a application's keystore. This is not really needed provided they have openssl available. Use openssl to retrieve the example.com LDAP server's SSL certificate chain: openssl s_client -showcerts -connect example.com:636 As an example, here is the output from https://www.thawte.com / $ openssl s_client -showcerts -connect www.thawte.com:443 CONNECTED(00000003) depth=3 /C=ZA/ST=Western Cape/L=Cape Town/O=Thawte Consulting cc/OU=Certification Services Division/CN=Thawte Premium Server CA/emailAddress=premium-server@thawte.com verify return:1 depth=2 /C=US/O=thawte, Inc./OU=Certification Services Division/OU=(c) 2006 thawte, Inc. - For authorized use only/CN=thawte Primary Root CA verify return:1 depth=1 /C=US/O=thawte, Inc./OU=Terms of use at https://www.thawte.com/cps (c)06/CN=thawte Extended Validation SSL CA verify return:1 depth=0 /1.3.6.1.4.1.311.60.2.1.3=US/1.3.6.1.4.1
""" People agree, I am a clever guy. :param skills_set: I possess a broad skill set and am always looking to optimize operations or implement elegant sustainable solutions. :param culture: Working alone or on a team, solving new, complex problems makes me happy. """