Created on
08-24-2024
06:00 AM
Edited on
06-25-2025
02:24 AM
By
Jean-Philippe_P
Description | This article describes troubleshooting steps to determine if the LDAPS server is sending an expired certificate when an LDAPS user logs in. |
Scope | FortiGate. |
Solution |
When troubleshooting issues for LDAPS user credentials, use the fnbamd debug to collect information about the interaction between the FortiGate and the LDAPS server.
FGT-A# diagnose debug console timestamp enable FGT-A# diagnose debug app fnbamd -1 FGT-A# diagnose debug enable FGT-A# diagnose test authserver ldap AD_LDAP user1 password
To disable the debugging commands above, run the following command:
FGT-A# diagnose debug disable
If the following log message is seen in the fnbamd debug it indicates that the certificate on the LDAPS server has expired.
2024-07-24 10:45:00 [1666] __verify_cb-Cert error 10, certificate has expired. Depth 0. Subject '' 2024-07-24 10:45:00 [1345] __ldap_tcps_connect-tcps_connect(172.16.37.10) failed: ssl_connect() failed: 167772294 (error:0A000086:SSL routines::certificate verify failed).
If the following log message is seen in the fnbamd debug it indicates that the certificate on the LDAPS server has expired.
This can be seen when expanding the packet on Wireshark:
Server Hello or Certificate Packet -> Transport Layer Security -> Certificate -> Validity -> notAfter:
Related articles: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.