LDAPS for Active Directory

%3CLINGO-SUB%20id%3D%22lingo-sub-2064856%22%20slang%3D%22en-US%22%3ELDAPS%20for%20Active%20Directory%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2064856%22%20slang%3D%22en-US%22%3E%3CP%3ECurrent%20we%20use%20ldap%20from%20application%20connect%20to%20Active%20Directory%20.%20Now%20we%20want%20change%20to%20LDAPS%20.we%20have%20CA%20internal%20and%20see%20in%20every%20server%20active%20directory%20has%20one%20certificate%20with%20the%20same%20name%20of%20active%20directory.%20So%20should%20use%20CA%20internal%20or%26nbsp%3Bself%20certification%20%3F%20and%20when%20create%20certification%20need%26nbsp%3B%20CN%20contain%20all%20name%20server%20of%20Active%20Directory%20%3F%20and%20application%20(Ldap%20client)%20need%20import%20which%20certificate%20to%20can%20connect%20to%20Active%20Directory%20by%20LDAPs%20%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2064856%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EActive%20Directory%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EWindows%20Server%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Regular Contributor

Current we use ldap from application connect to Active Directory . Now we want change to LDAPS .we have CA internal and see in every server active directory has one certificate with the same name of active directory. So should use CA internal or self certification ? and when create certification need  CN contain all name server of Active Directory ? and application (Ldap client) need import which certificate to can connect to Active Directory by LDAPs ?

2 Replies

@Tien Ngo Thanh The subject name of the certificate should contain the Domain Controller FQDN

@SumanBhowmik : Can use wild card domain