Skip to content

Commit 6f34eeb

Browse files
committed
[AzureADDS] LDAPS updates and graphics
1 parent c3b9ef7 commit 6f34eeb

File tree

4 files changed

+11
-14
lines changed

4 files changed

+11
-14
lines changed
10.6 KB
Loading
-31.6 KB
Loading
-80.1 KB
Loading

articles/active-directory-domain-services/tutorial-configure-ldaps.md

Lines changed: 11 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 10/30/2019
11+
ms.date: 03/31/2020
1212
ms.author: iainfou
1313

1414
#Customer intent: As an identity administrator, I want to secure access to an Azure Active Directory Domain Services managed domain using secure lightweight directory access protocol (LDAPS)
@@ -28,14 +28,14 @@ In this tutorial, you learn how to:
2828
> * Configure secure LDAP for use over the public internet
2929
> * Bind and test secure LDAP for an Azure AD DS managed domain
3030
31-
If you dont have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
31+
If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
3232

3333
## Prerequisites
3434

3535
To complete this tutorial, you need the following resources and privileges:
3636

3737
* An active Azure subscription.
38-
* If you dont have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
38+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3939
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
4040
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
4141
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
@@ -112,13 +112,13 @@ These two keys, the *private* and *public* keys, make sure that only the appropr
112112

113113
Before you can use the digital certificate created in the previous step with your Azure AD DS managed domain, export the certificate to a *.PFX* certificate file that includes the private key.
114114

115-
1. To open the *Run* dialog, select the **Windows** and **R** keys.
115+
1. To open the *Run* dialog, select the **Windows** + **R** keys.
116116
1. Open the Microsoft Management Console (MMC) by entering **mmc** in the *Run* dialog, then select **OK**.
117-
1. On the **User Account Control** prompt, click **Yes** to launch MMC as administrator.
118-
1. From the **File** menu, click **Add/Remove Snap-in...**
117+
1. On the **User Account Control** prompt, then select **Yes** to launch MMC as administrator.
118+
1. From the **File** menu, select **Add/Remove Snap-in...**
119119
1. In the **Certificates snap-in** wizard, choose **Computer account**, then select **Next**.
120120
1. On the **Select Computer** page, choose **Local computer: (the computer this console is running on)**, then select **Finish**.
121-
1. In the **Add or Remove Snap-ins** dialog, click **OK** to add the certificates snap-in to MMC.
121+
1. In the **Add or Remove Snap-ins** dialog, select **OK** to add the certificates snap-in to MMC.
122122
1. In the MMC window, expand **Console Root**. Select **Certificates (Local Computer)**, then expand the **Personal** node, followed by the **Certificates** node.
123123

124124
![Open the personal certificates store in the Microsoft Management Console](./media/tutorial-configure-ldaps/open-personal-store.png)
@@ -175,9 +175,6 @@ The *.CER* certificate file can now be distributed to client computers that need
175175
With a digital certificate created and exported that includes the private key, and the client computer set to trust the connection, now enable secure LDAP on your Azure AD DS managed domain. To enable secure LDAP on an Azure AD DS managed domain, perform the following configuration steps:
176176

177177
1. In the [Azure portal](https://portal.azure.com), enter *domain services* in the **Search resources** box. Select **Azure AD Domain Services** from the search result.
178-
179-
![Search for and select your Azure AD DS managed domain in the Azure portal](./media/tutorial-configure-ldaps/search-for-domain-services.png)
180-
181178
1. Choose your managed domain, such as *aaddscontoso.com*.
182179
1. On the left-hand side of the Azure AD DS window, choose **Secure LDAP**.
183180
1. By default, secure LDAP access to your managed domain is disabled. Toggle **Secure LDAP** to **Enable**.
@@ -233,10 +230,10 @@ With secure LDAP access enabled over the internet, update the DNS zone so that c
233230

234231
Configure your external DNS provider to create a host record, such as *ldaps*, to resolve to this external IP address. To test locally on your machine first, you can create an entry in the Windows hosts file. To successfully edit the hosts file on your local machine, open *Notepad* as an administrator, then open the file *C:\Windows\System32\drivers\etc*
235232

236-
The following example DNS entry, either with your external DNS provider or in the local hosts file, resolves traffic for *ldaps.aaddscontoso.com* to the external IP address of *40.121.19.239*:
233+
The following example DNS entry, either with your external DNS provider or in the local hosts file, resolves traffic for *ldaps.aaddscontoso.com* to the external IP address of *168.62.205.103*:
237234

238235
```
239-
40.121.19.239 ldaps.aaddscontoso.com
236+
168.62.205.103 ldaps.aaddscontoso.com
240237
```
241238

242239
## Test queries to the managed domain
@@ -259,7 +256,7 @@ To see of the objects stored in your Azure AD DS managed domain:
259256
1. Select the **View** menu option, and then choose **Tree**.
260257
1. Leave the *BaseDN* field blank, then select **OK**.
261258
1. Choose a container, such as *AADDC Users*, then right-select the container and choose **Search**.
262-
1. Leave the pre-populated fields set, then select **Run**. The results of the query are shown in the right-hand window.
259+
1. Leave the pre-populated fields set, then select **Run**. The results of the query are displayed in the right-hand window, as shown in the following example output:
263260

264261
![Search for objects in your Azure AD DS managed domain using LDP.exe](./media/tutorial-configure-ldaps/ldp-query.png)
265262

@@ -271,7 +268,7 @@ If you added a DNS entry to the local hosts file of your computer to test connec
271268

272269
1. On your local machine, open *Notepad* as an administrator
273270
1. Browse to and open the file *C:\Windows\System32\drivers\etc*
274-
1. Delete the line for the record you added, such as `40.121.19.239 ldaps.aaddscontoso.com`
271+
1. Delete the line for the record you added, such as `168.62.205.103 ldaps.aaddscontoso.com`
275272

276273
## Next steps
277274

0 commit comments

Comments
 (0)