This article explains how to ensure an AD Domain controller has a working LDAPS configuration.
Free AD Audit Tool
The first step to protecting AD accounts is to know what you have. This free tool does just that.
Free Privileged Access Management
Secure your infrastructure with the fastest to deploy Privileged Access Management solution. Introducing PAM Express from Osirium. For free, for 10 servers or network devices for production use.
Free Whitepaper
Get your free checklist that builds on years of practical experience to provide a roadmap for PAM success.
This article has been created to help you check if LDAPS is working. Although from release 7.5.2, LDAP is supported, we still recommend that LDAPS is used for communication between Osirium PAM and your Active Directory.
Using LDAP will only allow read-only access between Osirium PAM and your Active Directory. This means that you can not change the password of an Active Directory account or create a new account on the Active Directory through Osirium PAM.
This can only be done over LDAPS, hence why Osirium PAM recommends LDAPS to allow full management functionality when using Active Directory.
Osirium PAM 7.x onwards.
By default Domain Controller(s) listen over LDAP but not LDAPS. They do however still have an active socket listening on the LDAPS port (TCP 636) but by default, this does not function correctly.
To function correctly the Domain Controller(s) require a certificate (with 'Server Authentication' enabled) to be installed.
This happens automatically for all Domain Controllers if there is a Microsoft Certificate Authority role installed somewhere in the domain and it is configured with an Enterprise Root certificate.
To enable LDAPS on a Domain Controller using a self-signed certificate and without installing the Microsoft Certificate Authority role in the Domain see here (Osirium Support account required).
It is not sufficient to only check if the Domain Controller is listening on the LDAPS port (TCP 636), you also need to confirm if LDAPS is working.
To verify if LDAPS has been configured on your Domain Controller and is functioning correctly, perform the following steps on each Domain Controller that Osirium PAM will need to communicate with:
1. RDP onto the Domain Controller
2. Open the Run dialogue box and run the ldp.exe application.
3. Within the Ldp window, click the Connection menu and select Connect...
4. Within the Connect window, fill in the details as shown below.
5. Click OK.
6. If the server is correctly configured for LDAPS then line 5 of the output (you might need to scroll up) will show that the host supports SSL.
If the host is NOT configured for LDAPS then the following will be shown.
If you are running PAM v7.x then you will not be able to connect to the Domain Controller.
If you are running PAM v8.x you can configure SASL over LDAP as an alternative to LDAPS, however LDAPS is the recommended option.
Ransomware attacks destroy your data and backups. Get Osirium Fast Protect for just £4,995 to stop attacks deleting your backups.
If you have any questions or want to speak to one of our representatives, please complete this form and we'll be in touch.