Hi There,
Perhaps is this too late, but I have found a workaround :
I had the same issue on my own infrastructure at home… got 3 childrens (each with at least one workstation, some with a laptop too), a wife (workstation, laptop, andoid pad …) , a cat (he is the only one that doesn’t authenticate :-)) ) a couple of servers etc… everybody running openSuSE 12.1. Servers run SLES 11.
The main SLES server owns the LDAP directory, and I authenticate all my home users against the LDAP server home. They have nfs mounts etc, a completely standardized infra.
I understand very well that I should configure LDAPS and SSL on the LDAP server but… things work well for now and I’ll do it one of these days…
When I installed openSuSE12.2 on a VM to test it (before the upgrade campaign) I had exactly the same issue not LDAP TLS check box.
I first tried almost everything to solve that (even copying the ldap, nssswitch and pam.d configs form previous working 12.1 machines).
I have solved it like this :
Login to your workstation as a local user (or root but I would not do that…)
issue a console
su to root and launch
# yast2 ldap-client &
First setup the ldap-client with YaST normally, when the module complains about TLS just accept him to try without TLS. Leave all the TLS/SSL related stuf empty.
When finished, YaST ldap-client will complain about the fact that it will not be able to connect to the ldap server, ignore this and accept to keep the config.
# vi /etc/ldap.conf
locate the line :
ssl start_tls
comment this line with a dash at the beginning and insert a new line :
ssl no
save ldap.conf
#vi /etc/sssd/sssd.conf
locate the line :
ldap_id_use_start_tls = True
comment this line with a dash at the beginning and insert a new line :
ldap_id_use_start_tls = False
save sssd.conf
restart sssd :
# systemctl restart sssd.service
try this :
exit form the root shell, and as normal user
$ yast2 ldap_browser &
enter root password, and you should be prompted for the ldap credentials. put the ldap password and uncheck the LDAP TLS checkbox.
You should be able to navigate into the ldap.
close your session
login using one of the ldap userid, should work like a charm.