Understanding Security of port 80 and 389 for Identity Management Topologies

Updated -

Concerning the use of port 80 (HTTP). Red Hat Identity Management(IdM) will normally redirect requests that arrive on port 80 to port 443, except for Online Certificate Status Protocol (OCSP) responses and the Certificate Revocation Lists (CRL). Both are digitally signed and therefore secured against man-in-the-middle attacks.

In regards to port 389 (LDAP). There are two types of connec...

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content