*Obtain a copy of the Certificate Authority from OID *You will also need the port that OID has server side SSL enabled. *You must have java 1.4 or later installe don the machine you are running the commands on with proper paths setup. Create a [Java KeyStore] on the server you are running the driver on. In this case "G:" was mapped to SYS: {{{ Execute this command (with changes as needed to paths) java sun.security.tools.KeyTool - import - alias OIDTrustedRoot - file G:\SYSTEM\LIB\OID-ca.b64 - keystore G:\SYSTEM\LIB\.keystore -storepass keystorepass The response will be like: Owner: CN=somewhere, OU=ISS, O=Database Administration, C=US Issuer: CN=somewhere, OU=ISS, O=Database Administration, C=US Serial number: 1 Valid from: Wed Feb 22 08:17:41 EST 2006 until: Sat Feb 20 08:17:41 EST 2016 Certificate fingerprints: MD5: D7:03:66:1A:F8:AA:63:14:E0:78:6D:5D:AC:1D:7F:DD SHA1:A8:DB:4F:54:75:0A:8D:78:A0:D2:BF:B3:4C:AE:AC:3E:DF:80:9E:C3 Trust this certificate? [no]: yes Certificate was added to keystore }}} In this case the path to the keystore is: (We were on Netware) \SYSTEM\LIB\.keystore This needs to be put in the Driver properties page under Driver {{{ Settings Use SSL = yes SSL Port =3336 Keystore Path (for SSL certs)\system\lib\.keystore }}} Restart the driver. You can verify the connection from looking in dstrace and finding the entry like: {{{ 11:38:02 6B0001A0 Drvrs: OID PT: OID- LDAP: Host name: 151.132.97.73 11:38:02 6B0001A0 Drvrs: OID PT: OID- LDAP: Port: 3336 11:38:02 6B0001A0 Drvrs: OID PT: OID- LDAP: DN: cn=IdM,cn=Users,dc=co,dc=palm- beach,dc=fl,dc=us 11:38:02 6B0001A0 Drvrs: OID PT: OID- LDAP: Protocol version=3 }}}