Implementing Cisco Intersight with LDAP Directory Service: Steps for Secure Environment

Implementing Cisco Intersight with LDAP Directory Service

Question

An engineer is implementing Cisco Intersight in a secure environment.

The environment must use LDAP directory service and ensure information integrity and confidentiality.

Which two steps must be taken to implement the solution? (Choose two.)

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E.

AB.

To implement Cisco Intersight in a secure environment that uses LDAP directory service and ensures information integrity and confidentiality, the following two steps must be taken:

B. Add a trusted root LDAP certificate to Cisco Intersight:

When integrating with LDAP directory service, Cisco Intersight requires a trusted root LDAP certificate. This certificate is used to establish a secure communication channel between Cisco Intersight and the LDAP directory service. It is recommended to use a trusted root certificate from a well-known certificate authority (CA) to ensure the certificate is valid and can be verified. Adding a trusted root LDAP certificate to Cisco Intersight is an important step to ensure that the connection between Cisco Intersight and LDAP directory service is secure.

C. Enable Encryption for LDAP:

LDAP communication between Cisco Intersight and LDAP directory service must be encrypted to ensure information confidentiality. Enabling encryption for LDAP ensures that sensitive information such as usernames and passwords are protected during transmission. It is recommended to use SSL/TLS to encrypt the LDAP communication channel. By enabling encryption for LDAP, any data transmitted between Cisco Intersight and LDAP directory service will be protected from unauthorized access.

Therefore, options B and C are the correct answers.

Option A is not relevant to LDAP directory service and information security.

Option D suggests using a self-signed certificate, which is not recommended for a production environment as it may cause trust issues.

Option E suggests using an OAuth token, which is not relevant to LDAP directory service and information security.