You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
### Create containers and a service account for AD LDS
80
80
The use the PowerShell script from [Appendix C](#appendix-c---populate-ad-lds-powershell-script). The script performs the following actions:
81
81
- Creates a container for the service account that will be used with the LDAP connector
82
-
- Creates a container for the cloud users. This container is where users will be provisioned to.
82
+
- Creates a container for the cloud users, where users will be provisioned to
83
83
- Creates the serve account in AD LDS
84
84
- Enables the service account
85
85
- Adds the service account to the AD LDS Administrators role
86
86
87
87
On the Windows Server virtual machine, you are using to test the LDAP connector run the script using Windows PowerShell with administrative privileges.
88
88
89
-
### Grant the NETWORK SERVICE read permissions to the SSL cert
89
+
### Grant the NETWORK SERVICE read permissions to the SSL certificate
90
90
In order to enable SSL to work, you need to grant the NETWORK SERVICE read permissions to our newly created certificate. To grant permissions, use the following steps.
91
91
92
92
1. Navigate to **C:\Program Data\Microsoft\Crypto\Keys**.
93
93
2. Right-click on the system file located here. It will be a guid. This container is storing our certificate.
94
-
a. Select properties.
95
-
b. At the top, select the **Security** tab.
96
-
c. Select **Edit**.
97
-
d. Click **Add**.
98
-
e. In the box, enter **Network Service** and select **Check Names**.
99
-
f. Select **NETWORK SERVICE** from the list and click **OK**.
100
-
g. Click **Ok**.
101
-
h. Ensure the Network service account has read and read & execute permissions and click **Apply** and **OK**.
94
+
- Select properties.
95
+
- At the top, select the **Security** tab.
96
+
- Select **Edit**.
97
+
- Click **Add**.
98
+
- In the box, enter **Network Service** and select **Check Names**.
99
+
- Select **NETWORK SERVICE** from the list and click **OK**.
100
+
- Click **Ok**.
101
+
- Ensure the Network service account has read and read & execute permissions and click **Apply** and **OK**.
102
102
103
103
### Verify SSL connectivity with AD LDS
104
104
Now that we have configured the certificate and granted the network service account permissions, test the connectivity to verify that it is working.
@@ -110,9 +110,9 @@ Now that we have configured the certificate and granted the network service acco
@@ -316,6 +316,8 @@ If the error message is **Failed to create User**, then check the attributes tha
316
316
317
317
For more information, change to the **Troubleshooting & Recommendations** tab.
318
318
319
+
For other errors, see [troubleshooting on-premises application provisioning](../articles/active-directory/app-provisioning/on-premises-ecma-troubleshoot.md).
320
+
319
321
## Check that users were successfully provisioned
320
322
After waiting, check your directory to ensure users are being provisioned. The following instructions illustrate how to check AD LDS.
0 commit comments