Versions Compared


  • This line was added.
  • This line was removed.
  • Formatting was changed.


Where you should use the values in the flexVDI Terminal Policy you are debugging:

  • After -h write the value of "Server IP"

  • After -p write the value of "Server port".

  • After -b write the value of "Realm" (this is the point of the ldap tree under which entries will be searched)

  • After -D write the value of "Proxy user"

  • After -w write the value of "Proxy password".

  • Instead of cn (in cn=testUser1) you have to use the value in the "Entry rdn" box. For example, in windows systems you typically use a terminal policy with "Entry rdn==samaccountname", so you would use samaccountname=testUser1 in your command as the search condition.

  • "cn dn description samaccountname" are some relevant fields in an ldap that we are requesting to be shown.

If everything is right, your line will show you the values of "cn dn description samaccountname" of the entry for the specified user in your directory. Otherwise, you have to tweak the parameters to know what is wrong. For instance:

  • you can change the search condition from "cn=testUser1" to "*" so that you are shown all the entries in the ldap.

  • you can use '*' instead of "cn dn description samaccountname" at the end of the line to show all the fields in the ldap.

For security, you should use -W instead of "-w 'yourPassword'" so that you are prompted for the password instead of specifying it at the command line.


"Active Directory Users and Computers" is a snap-in provided with Windows servers that is commonly used for managing users in an LDAP. It can be confusing for system administrators that many of the labels shown in this program are different from the actual names of the fields in the Active directory. For information about the mapping between labels in "Active Directory Users and Computers" and actual names, see the MS documentation at, or also

In most LDAP implementations, cn is the field in the ldap used as id of the users. MS Windows OS uses sAMAccountname field as user name, so if you are using an Active Directory server, you probably want to use sAMAccountname as flexVDI "Entry rdn" so that Windows and flexVDI use thesame field as user name.


When using LDAPS, the ldapsarch command can be instructed about the CA certificate it has to trust, storing it in the environment variable named LDAPTLS_CACERT with a command like:

Code Block
$ LDAPTLS_CACERT=${PATH_TO_MY_CERTIFICATE}/myCA.pem ldapsearch -LLL -x -h -p 636 -b 'cn=Users,DC=flexvdi,DC=localdomain' -D 'flexvdi\administrator' -w 'yourPassword' cn=testUser1 cn dn description samaccountname


A: flexVDI Manager does not trust the certificate used by the ldap serverldaps server. Some causes for these are:

  • The server certificate, or any of the certificates in the trust chain up to the CA may have expired.

  • The server is using a new certificate, and you are using an old versión of flexVDI Manager that does not include recent CA certificates.

Keep in mind that flexVDI Manager runs on a JVM, so it uses the JVM trust store, and not the same trust store that ldapsearch command uses.

For solving this, you can:

  • Update your flexVDI manager so that it contains more up to date certificate.

  • Update the trusted certificates of your flexVDI manager VM running: “yum update ca-certificates && systemctl restart flexvdi-manager”

  • Follow the instructions at Authenticating users with LDAPS to install the Ldaps server certificate in your flexVDI manager.