Skip to content

Commit 1d850f6

Browse files
authored
Merge pull request #48074 from MicrosoftDocs/master
8/2 AM Publish
2 parents 96f498d + a969569 commit 1d850f6

File tree

978 files changed

+18228
-17258
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

978 files changed

+18228
-17258
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15270,6 +15270,11 @@
1527015270
"redirect_url": "/azure/virtual-machines/linux/expand-disks-nodejs",
1527115271
"redirect_document_id": false
1527215272
},
15273+
{
15274+
"source_path": "articles/active-directory/develop/active-directory-developers-guide.md",
15275+
"redirect_url": "/azure/active-directory/develop/azure-ad-developers-guide",
15276+
"redirect_document_id": false
15277+
},
1527315278
{
1527415279
"source_path": "articles/virtual-machines/virtual-machines-linux-expand-disks.md",
1527515280
"redirect_url": "/azure/virtual-machines/linux/expand-disks",

articles/active-directory-domain-services/TOC.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,9 @@
3636
#### [Task 1: obtain a certificate for secure LDAP](active-directory-ds-admin-guide-configure-secure-ldap.md)
3737
#### [Task 2: export the secure LDAP certificate](active-directory-ds-admin-guide-configure-secure-ldap-export-pfx.md)
3838
#### [Task 3: enable secure LDAP for the managed domain using Azure portal](active-directory-ds-admin-guide-configure-secure-ldap-enable-ldaps.md)
39+
#### [Task 4: configure DNS to access the managed domain from the internet](active-directory-ds-ldaps-configure-dns.md)
40+
#### [Task 5: bind to the managed domain and lock down secure LDAP access](active-directory-ds-ldaps-bind-lockdown.md)
41+
#### [Troubleshoot secure LDAP](active-directory-ds-ldaps-troubleshoot.md)
3942

4043
### [Create an OU on a managed domain](active-directory-ds-admin-guide-create-ou.md)
4144
### [Create a group managed service account on a managed domain](active-directory-ds-create-gmsa.md)
Lines changed: 11 additions & 90 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Configure Secure LDAP (LDAPS) in Azure AD Domain Services | Microsoft Docs
3-
description: Configure Secure LDAP (LDAPS) for an Azure AD Domain Services managed domain
2+
title: Enable Secure LDAP (LDAPS) in Azure AD Domain Services | Microsoft Docs
3+
description: Enable Secure LDAP (LDAPS) for an Azure AD Domain Services managed domain
44
services: active-directory-ds
55
documentationcenter: ''
66
author: mahesh-unnikrishnan
@@ -14,17 +14,17 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: article
17-
ms.date: 06/27/2018
17+
ms.date: 08/01/2018
1818
ms.author: maheshu
1919

2020
---
21-
# Configure secure LDAP (LDAPS) for an Azure AD Domain Services managed domain
21+
# Enable secure LDAP (LDAPS) for an Azure AD Domain Services managed domain
2222

2323
## Before you begin
24-
Ensure you've completed [Task 2 - export the secure LDAP certificate to a .PFX file](active-directory-ds-admin-guide-configure-secure-ldap-export-pfx.md).
24+
Complete [Task 2 - export the secure LDAP certificate to a .PFX file](active-directory-ds-admin-guide-configure-secure-ldap-export-pfx.md).
2525

2626

27-
## Task 3 - enable secure LDAP for the managed domain using the Azure portal
27+
## Task 3: Enable secure LDAP for the managed domain using the Azure portal
2828
To enable secure LDAP, perform the following configuration steps:
2929

3030
1. Navigate to the **[Azure portal](https://portal.azure.com)**.
@@ -44,7 +44,7 @@ To enable secure LDAP, perform the following configuration steps:
4444
4. By default, secure LDAP access to your managed domain is disabled. Toggle **Secure LDAP** to **Enable**.
4545

4646
![Enable secure LDAP](./media/active-directory-domain-services-admin-guide/secure-ldap-blade-configure.png)
47-
5. By default, secure LDAP access to your managed domain over the internet is disabled. Toggle **Allow secure LDAP access over the internet** to **Enable**, if desired.
47+
5. By default, secure LDAP access to your managed domain over the internet is disabled. Toggle **Allow secure LDAP access over the internet** to **Enable**, if you need to.
4848

4949
> [!WARNING]
5050
> When you enable secure LDAP access over the internet, your domain is susceptible to password brute force attacks over the internet. Therefore, we recommend setting up an NSG to lock down access to required source IP address ranges. See the instructions to [lock down LDAPS access to your managed domain over the internet](#task-5---lock-down-secure-ldap-access-to-your-managed-domain-over-the-internet).
@@ -54,9 +54,9 @@ To enable secure LDAP, perform the following configuration steps:
5454

5555
7. Specify the **Password to decrypt .PFX file**. Provide the same password you used when exporting the certificate to the PFX file.
5656

57-
8. When you are done, click the **Save** button.
57+
8. When you're done, click the **Save** button.
5858

59-
9. You see a notification that informs you secure LDAP is being configured for the managed domain. Until this operation is complete, you cannot modify other settings for the domain.
59+
9. You see a notification that informs you secure LDAP is being configured for the managed domain. Until this operation is complete, you can't modify other settings for the domain.
6060

6161
![Configuring secure LDAP for the managed domain](./media/active-directory-domain-services-admin-guide/secure-ldap-blade-configuring.png)
6262

@@ -65,84 +65,5 @@ To enable secure LDAP, perform the following configuration steps:
6565
>
6666
>
6767
68-
<br>
69-
70-
## Task 4 - configure DNS to access the managed domain from the internet
71-
> [!NOTE]
72-
> **Optional task** - If you do not plan to access the managed domain using LDAPS over the internet, skip this configuration task.
73-
>
74-
>
75-
76-
Before you begin this task, ensure you have completed the steps outlined in [Task 3](#task-3---enable-secure-ldap-for-the-managed-domain-using-the-azure-portal-preview).
77-
78-
Once you have enabled secure LDAP access over the internet for your managed domain, you need to update DNS so that client computers can find this managed domain. At the end of task 3, an external IP address is displayed on the **Properties** tab in **EXTERNAL IP ADDRESS FOR LDAPS ACCESS**.
79-
80-
Configure your external DNS provider so that the DNS name of the managed domain (for example, 'ldaps.contoso100.com') points to this external IP address. For example, create the following DNS entry:
81-
82-
ldaps.contoso100.com -> 52.165.38.113
83-
84-
That's it - you are now ready to connect to the managed domain using secure LDAP over the internet.
85-
86-
> [!WARNING]
87-
> Remember that client computers must trust the issuer of the LDAPS certificate to be able to connect successfully to the managed domain using LDAPS. If you are using a publicly trusted certification authority, you do not need to do anything since client computers trust these certificate issuers. If you are using a self-signed certificate, install the public part of the self-signed certificate into the trusted certificate store on the client computer.
88-
>
89-
>
90-
91-
92-
## Task 5 - lock down secure LDAP access to your managed domain over the internet
93-
> [!NOTE]
94-
> If you have not enabled LDAPS access to the managed domain over the internet, skip this configuration task.
95-
>
96-
>
97-
98-
Before you begin this task, ensure you have completed the steps outlined in [Task 3](#task-3---enable-secure-ldap-for-the-managed-domain-using-the-azure-portal-preview).
99-
100-
Exposing your managed domain for LDAPS access over the internet represents a security threat. The managed domain is reachable from the internet at the port used for secure LDAP (that is, port 636). Therefore, you can choose to restrict access to the managed domain to specific known IP addresses. For improved security, create a network security group (NSG) and associate it with the subnet where you have enabled Azure AD Domain Services.
101-
102-
The following table illustrates a sample NSG you can configure, to lock down secure LDAP access over the internet. The NSG contains a set of rules that allow inbound secure LDAP access over TCP port 636 only from a specified set of IP addresses. The default 'DenyAll' rule applies to all other inbound traffic from the internet. The NSG rule to allow LDAPS access over the internet from specified IP addresses has a higher priority than the DenyAll NSG rule.
103-
104-
![Sample NSG to secure LDAPS access over the internet](./media/active-directory-domain-services-admin-guide/secure-ldap-sample-nsg.png)
105-
106-
**More information** - [Network security groups](../virtual-network/security-overview.md).
107-
108-
<br>
109-
110-
## Bind to the managed domain over LDAP using LDP.exe
111-
You can use the LDP.exe tool which is included in the Remote Server Administration tools package to bind and search over LDAP.
112-
113-
First, open LDP and connect to the managed domain. Click **Connection** and click **Connect...** in the menu. Specify the DNS domain name of the managed domain. Specify the port to use for connections. For LDAP connections, use port 389. For LDAPS connections use port 636. Click **OK** button to connect to the managed domain.
114-
115-
Next, bind to the managed domain. Click **Connection** and click **Bind...** in the menu. Provide the credentials of a user account belonging to the 'AAD DC Administrators' group.
116-
117-
Select **View**, and then select **Tree** in the menu. Leave the Base DN field blank, and click OK. Navigate to the container that you want to search, right-click the container, and select Search.
118-
119-
> [!TIP]
120-
> - Users and groups synchronized from Azure AD are stored in the **AADDC Users** container. The search path for this container looks like ```CN=AADDC\ Users,DC=CONTOSO100,DC=COM```.
121-
> - Computer accounts for computers joined to the managed domain are stored in the **AADDC Computers** container. The search path for this container looks like ```CN=AADDC\ Computers,DC=CONTOSO100,DC=COM```.
122-
>
123-
>
124-
125-
More information - [LDAP query basics](https://technet.microsoft.com/library/aa996205.aspx)
126-
127-
128-
## Troubleshooting
129-
If you have trouble connecting to the managed domain using secure LDAP, perform the following troubleshooting steps:
130-
* Ensure that the issuer chain of the secure LDAP certificate is trusted on the client. You may choose to add the Root certification authority to the trusted root certificate store on the client to establish the trust.
131-
* Verify that the LDAP client (for example, ldp.exe) connects to the secure LDAP endpoint using a DNS name, not the IP address.
132-
* Verify the DNS name the LDAP client connects to resolves to the public IP address for secure LDAP on the managed domain.
133-
* Verify the secure LDAP certificate for your managed domain has the DNS name in the Subject or the Subject Alternative Names attribute.
134-
* If you are connecting via secure LDAP over the internet, ensure the NSG settings for the virtual network allow the traffic to port 636 from the internet.
135-
136-
If you still have trouble connecting to the managed domain using secure LDAP, [contact the product team](active-directory-ds-contact-us.md) for help. Include the following information to help diagnose the issue better:
137-
* A screenshot of ldp.exe making the connection and failing.
138-
* Your Azure AD tenant ID, and the DNS domain name of your managed domain.
139-
* Exact user name that you are trying to bind as.
140-
141-
142-
## Related content
143-
* [Azure AD Domain Services - Getting Started guide](active-directory-ds-getting-started.md)
144-
* [Administer an Azure AD Domain Services managed domain](active-directory-ds-admin-guide-administer-domain.md)
145-
* [LDAP query basics](https://technet.microsoft.com/library/aa996205.aspx)
146-
* [Administer Group Policy on an Azure AD Domain Services managed domain](active-directory-ds-admin-guide-administer-group-policy.md)
147-
* [Network security groups](../virtual-network/security-overview.md)
148-
* [Create a Network Security Group](../virtual-network/tutorial-filter-network-traffic.md)
68+
## Next step
69+
[Task 4: configure DNS to access the managed domain from the internet](active-directory-ds-ldaps-configure-dns.md)

articles/active-directory-domain-services/active-directory-ds-admin-guide-configure-secure-ldap-export-pfx.md

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Configure Secure LDAP (LDAPS) in Azure AD Domain Services | Microsoft Docs
3-
description: Configure Secure LDAP (LDAPS) for an Azure AD Domain Services managed domain
2+
title: Create a secure LDAP certificate for an Azure AD Domain Services manage domain | Microsoft Docs
3+
description: Create a secure LDAP certificate for an Azure AD Domain Services manage domain
44
services: active-directory-ds
55
documentationcenter: ''
66
author: mahesh-unnikrishnan
@@ -14,20 +14,20 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: article
17-
ms.date: 06/30/2017
17+
ms.date: 08/01/2017
1818
ms.author: maheshu
1919

2020
---
21-
# Configure secure LDAP (LDAPS) for an Azure AD Domain Services managed domain
21+
# Create a .PFX file with the secure LDAP (LDAPS) certificate for a managed domain
2222

2323
## Before you begin
24-
Ensure you've completed [Task 1 - obtain a certificate for secure LDAP](active-directory-ds-admin-guide-configure-secure-ldap.md).
24+
Complete [Task 1: obtain a certificate for secure LDAP](active-directory-ds-admin-guide-configure-secure-ldap.md).
2525

2626

27-
## Task 2 - export the secure LDAP certificate to a .PFX file
28-
Before you start this task, ensure that you have obtained the secure LDAP certificate from a public certification authority or have created a self-signed certificate.
27+
## Task 2: Export the secure LDAP certificate to a .PFX file
28+
Before you start this task, get the secure LDAP certificate from a public certification authority or create a self-signed certificate.
2929

30-
Perform the following steps, to export the LDAPS certificate to a .PFX file.
30+
To export the LDAPS certificate to a .PFX file:
3131

3232
1. Press the **Start** button and type **R**. In the **Run** dialog, type **mmc** and click **OK**.
3333

@@ -51,7 +51,7 @@ Perform the following steps, to export the LDAPS certificate to a .PFX file.
5151
8. In the MMC window, click to expand **Console Root**. You should see the Certificates snap-in loaded. Click **Certificates (Local Computer)** to expand. Click to expand the **Personal** node, followed by the **Certificates** node.
5252

5353
![Open personal certificates store](./media/active-directory-domain-services-admin-guide/secure-ldap-open-personal-store.png)
54-
9. You should see the self-signed certificate we created. You can examine the properties of the certificate to ensure the thumbprint matches that reported on the PowerShell windows when you created the certificate.
54+
9. You should see the self-signed certificate we created. You can examine the properties of the certificate to verify the thumbprint matches that reported on the PowerShell windows when you created the certificate.
5555
10. Select the self-signed certificate and **right click**. From the right-click menu, select **All Tasks** and select **Export...**.
5656

5757
![Export certificate](./media/active-directory-domain-services-admin-guide/secure-ldap-export-cert.png)
@@ -66,6 +66,7 @@ Perform the following steps, to export the LDAPS certificate to a .PFX file.
6666
> You MUST export the private key along with the certificate. If you provide a PFX that does not contain the private key for the certificate, enabling secure LDAP for your managed domain fails.
6767
>
6868
>
69+
6970
13. On the **Export File Format** page, select **Personal Information Exchange - PKCS #12 (.PFX)** as the file format for the exported certificate.
7071

7172
![Export certificate file format](./media/active-directory-domain-services-admin-guide/secure-ldap-export-to-pfx.png)
@@ -74,14 +75,16 @@ Perform the following steps, to export the LDAPS certificate to a .PFX file.
7475
> Only the .PFX file format is supported. Do not export the certificate to the .CER file format.
7576
>
7677
>
77-
14. On the **Security** page, select the **Password** option and type in a password to protect the .PFX file. Remember this password since it will be needed in the next task. Click **Next** to proceed.
78+
79+
14. On the **Security** page, select the **Password** option and type in a password to protect the .PFX file. Remember this password since it will be needed in the next task. Click **Next**.
7880

7981
![Password for certificate export ](./media/active-directory-domain-services-admin-guide/secure-ldap-export-select-password.png)
8082

8183
> [!NOTE]
8284
> Make a note of this password. You need it while enabling secure LDAP for this managed domain in [Task 3 - enable secure LDAP for the managed domain](active-directory-ds-admin-guide-configure-secure-ldap-enable-ldaps.md)
8385
>
8486
>
87+
8588
15. On the **File to Export** page, specify the file name and location where you'd like to export the certificate.
8689

8790
![Path for certificate export](./media/active-directory-domain-services-admin-guide/secure-ldap-export-select-path.png)
@@ -91,4 +94,4 @@ Perform the following steps, to export the LDAPS certificate to a .PFX file.
9194

9295

9396
## Next step
94-
[Task 3 - enable secure LDAP for the managed domain](active-directory-ds-admin-guide-configure-secure-ldap-enable-ldaps.md)
97+
[Task 3: enable secure LDAP for the managed domain](active-directory-ds-admin-guide-configure-secure-ldap-enable-ldaps.md)

0 commit comments

Comments
 (0)