You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/windows-server/windows-security/confidential-attributes-unexpected-behavior-using-windows-server-2025-dc.md
+32-16Lines changed: 32 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ When you search for or edit Active Directory Domain Services (AD DS) objects, yo
22
22
23
23
- When you run a Lightweight Directory Access Protocol (LDAP) search request against a Windows Server 2025-based DC, the resulting attribute list doesn't include confidential attributes. However, if you run the same LDAP query against a Windows Server 2022-based DC (or a DC that runs an older version of Windows Server), you obtain a full attribute list in the response.
24
24
25
-
- When you run an LDAP request that adds or modifies confidential attribute values against a Windows Server 2025-based DC, the request fails and returns an `INSUFF_ACCESS_RIGHTS` error. If you run the same LDAP request against a Windows Server 2022-based DC (or a DC that runs an older version of Windows Server), the request succeeds.
25
+
- When you run an LDAP update request that adds or modifies confidential attribute values against a Windows Server 2025-based DC, the update request fails and returns an `INSUFF_ACCESS_RIGHTS` error. If you run the same LDAP update request against a Windows Server 2022-based DC (or a DC that runs an older version of Windows Server), the update request succeeds.
26
26
27
27
### Example - Search results omit confidential attributes
28
28
@@ -37,11 +37,15 @@ The client connects and exports a list of the object's attributes, and generates
37
37
```output
38
38
Connecting to "dc25"
39
39
Logging in as current user using SSPI
40
-
Exporting directory to file con
40
+
Exporting directory to file test-comp01.txt
41
41
Searching for entries...
42
42
Writing out entries.
43
+
1 entries exported
43
44
```
44
45
46
+
> [!NOTE]
47
+
> This example text results from using an LDAP client on Windows 11, 23H2, or an older version of Windows.
48
+
45
49
However, when you review the exported list, you find the "cn" attribute but not the "ms-Mcs-AdmPwd" attribute.
46
50
47
51
When you target the query to a DC that runs an older version of Windows, the resulting exported list includes both "cn" and "ms-Mcs-AdmPwd."
@@ -53,9 +57,9 @@ The following table summarizes the behavior across different client and server v
53
57
| Windows 11, version 24H2 | Windows Server 2025 | "cn"<br />"ms-Mcs-AdmPwd" |
54
58
| Windows Server 2025 (member server) | Windows Server 2025 | "cn"<br />"ms-Mcs-AdmPwd" |
55
59
| Windows version older than Windows 11, version 24H2 | Windows Server 2025 | "cn" |
56
-
| Non-Windows operating system (for example, ldifde on UNIX) | Windows Server 2025 | "cn" |
60
+
| Non-Windows operating system (for example, a UNIX-based client) | Windows Server 2025 | "cn" |
57
61
| Windows version older than Windows 11, version 24H2 | Windows Server 2022 or an older version | "cn"<br />"ms-Mcs-AdmPwd" |
58
-
| Non-Windows operating system (for example, ldifde on UNIX) | Windows Server 2022 or an older version | "cn"<br />"ms-Mcs-AdmPwd" |
62
+
| Non-Windows operating system (for example, a UNIX-based client) | Windows Server 2022 or an older version | "cn"<br />"ms-Mcs-AdmPwd" |
59
63
60
64
### Example - Operations on confidential attributes fail
61
65
@@ -114,11 +118,13 @@ Because of new functionality in Windows Server 2025 DCs, your administrative cli
114
118
115
119
-**Improved security for confidential attributes**: DCs and AD LDS instances only allow LDAP to add, search, and modify operations that involve confidential attributes when the connection is encrypted.
116
120
121
+
This behavior doesn't affect LDAP clients that run on Windows Server 2025-based member servers or Windows 11, version 24H2-based computers. On these operating system versions, LDAP clients use encrypted sessions by default.
122
+
117
123
## Workaround
118
124
119
125
To work around this issue, use one of the following methods:
120
126
121
-
- Configure your LDAP client to use the [**LDAP_OPT_ENCRYPT**](/previous-versions/windows/desktop/ldap/session-options) session option (or update to a client that supports this option).
127
+
- Configure your LDAP client to use the [**LDAP_OPT_ENCRYPT**](/previous-versions/windows/desktop/ldap/session-options) session option (or update to a client that supports this option). If you're using ldifde on Windows, use the `/h` switch (for example, run `ldifde /h /s dc25 -i /f .\update.txt`).
122
128
123
129
- Use Windows Server 2025 or Windows 11 24H2, or a newer version, as an LDAP client. These operating systems encrypt LDAP sessions by default. For more information about this feature, see [What's new in Windows Server 2025](/windows-server/get-started/whats-new-windows-server-2025#active-directory-domain-services).
124
130
@@ -136,7 +142,8 @@ Several new Directory Service events document this behavior. The following table
The directory blocked access to one or more confidential attributes on one or more LDAP search requests because one or more clients were using an unencrypted LDAP connection.
The directory blocked one or more LDAP modify requests including changes to one or more confidential attributes because one or more clients were using an unencrypted LDAP connection.
The directory blocked one or more LDAP add requests including changes to one or more confidential attributes because one or more clients were using an unencrypted LDAP connection.
184
+
```
173
185
174
186
### Deeper investigation
175
187
@@ -197,16 +209,17 @@ When these settings take effect, all LDAP queries to AD DS generate instances of
197
209
198
210
To continue the previous example, the query for "cn" and "ms-Mcs-AdmPwd" generates Event ID 3079, followed by Event ID 1644. Event ID 1544 resembles the following example:
> See the previous event log entry for details. An entry is considered a duplicate if the event code and all of its insertion parameters are identical. The time period for this run of duplicates is from the time of the previous event to the time of this event.
235
-
>
236
-
> Event Code:
248
+
249
+
See the previous event log entry for details. An entry is considered a duplicate if the event code and all of its insertion parameters are identical. The time period for this run of duplicates is from the time of the previous event to the time of this event.
250
+
251
+
Event Code:
237
252
80000c07
238
253
Number of duplicate entries:
239
254
7
255
+
```
240
256
241
257
In this context, the information in these events indicates the following behavior:
0 commit comments