Тёмный
No video :(

Securing LDAP over SSL Safely [Windows Server 2019] 

OsbornePro TV
Подписаться 2,2 тыс.
Просмотров 37 тыс.
50% 1

Опубликовано:

 

5 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 200   
@tusharjambhekar
@tusharjambhekar 3 года назад
This really helpful video for LDAP over SSL. Can you let me know same steps can follow if we have 3rd part SSL certificate with full certificate chain (Root/Intermediate) and which includes SAN (Subject Alternative Name). Currently I am using self signed certificate which which gives error "Verify return code: 21 (unable to verify the first certificate)" as it's not trusted certificate I guess. Kindly reply on this.
@OsbornePro
@OsbornePro 3 года назад
Glad to hear you say that thank you. Much appreciated. This is a great special case so I am pinning this comment for anyone who may also be in your situation. If I understand correctly, my best guess right now is you are using the "Kerberos Authentication" certificate template I covered in the video. This will not work for your situation unfortunately because the CA is not going to look at the SAN value. You will need to use the "Web Server" certificate template (Version Windows Server 2003 under General Tab). Because the CA is a third party we need to create our request manually with certutil I tried creating a "request.inf" file for you to use. You will need to add your servers FQDN to the subject value and SAN values where appropriate CONTENTS OF request.inf ################################################################################################### [Version] Signature=”$Windows NT$” [NewRequest] Subject = “CN=hostname.domain.com” ; Must be FQDN of Domain Controller EncipherOnly = FALSE ; Default value and is optional I believe Exportable = TRUE ; Private key is exportable KeyLength = 2048 ; Key sizes: 2048 KeySpec = 1 ; AT_KEYEXCHANGE (Key Exchange) KeyUsage = 0xA0 ; Digital Signature, Key Encipherment MachineKeySet = True ; The key belongs to the local computer account ProviderName = “Microsoft RSA SChannel Cryptographic Provider” ProviderType = 12 RequestType = CMC [EnhancedKeyUsageExtension] OID=1.3.6.1.5.5.7.3.1 ; Server Authentication ;[RequestAttributes] ;CertificateTemplate= WebServer ; Include the above line and below two lines if CA is a stand-alone CA and remove the Extensions section below ;"SAN="dns=san.domain.com&dns=san2.domain.com&dns=san3.domain.com" ; SAN Values go here separated by & ;I assume it is not a standalone CA so we do this [Extensions] ;2.5.29.17 is the OID for a SAN extension. 2.5.29.17 = "{text}" _continue_ = "dns=san1.domain.com&" _continue_ = "dns=san2.domain.com&" _continue_ = "dns=san3.domain.com&" ##################################################################################################### # COMMANDS TO CREATE CSR REQUEST USING ABOVE FILE certreq -new request.inf newcert.req certutil newcert.req # Submit the above certificate request to your 3rd Party CA Hope that helps. If you would like to feel free to email me at info@osbornepro.com
@tusharjambhekar
@tusharjambhekar 3 года назад
@@OsbornePro Hi I have my CA third party certificate with above details with SAN details. I want if want to install that certificate chain what the exact steps , or I can just import that pfx/p12 which contain all my CA certificate chain in place like which includes (certificate.pub certificate.key certificate.cer ). thanks , waiting for reply.
@OsbornePro
@OsbornePro 3 года назад
@@tusharjambhekar sorry I am just noticing this response now. My notifications seem to sometimes tell me and sometimes not. You can just simply right click on the pfx certificate in Windows and select install. For anyone who may not know, Pfx means the private key is in there which you need as the LDAPS server will use it. Make sure the other devices in the domain trust the root CA’s of that third party. You will need to export those separately before installing them on other devices in the environment. This is because we don’t want that private key leaving the Domain Controller
@r2k247
@r2k247 5 месяцев назад
This is the best video I have seen on youtube covering ldaps. Seriously! I just wish you could cover more cert videos on rdp, smb, and ntlm. Your really good.
@OsbornePro
@OsbornePro 3 месяца назад
Thanks for watching! Glad it was helpful. I love hearing when things like this get implemented you are killing it
@emccaffe1
@emccaffe1 2 года назад
Thank you for this. I've been having difficulty finding anything decent showing the process from end-to-end. This was extremely helpful.
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching! Glad it helped
@pstz_800
@pstz_800 Месяц назад
The best LDAP tutorial, I have ever seen. Thanks.
@OsbornePro
@OsbornePro Месяц назад
@@pstz_800 thanks for watching glad it was helpful!
@RodrigoLelesMiranda
@RodrigoLelesMiranda Год назад
Rob i shared your channel in my groups on whatsapp and telegran, here in Brazil we use more whattsapp than Telegram. My main commemts is about you always answer our question and content is very very good, the best i'd say...
@OsbornePro
@OsbornePro Год назад
Thanks appreciate you saying that and you support! I do my best to try to always answer. It’s still doable at this point :)
@RodrigoLelesMiranda
@RodrigoLelesMiranda Год назад
​@@OsbornePro very thanks for your effort. My english is not very well, but i shared in some group from India.
@OsbornePro
@OsbornePro Год назад
@@RodrigoLelesMiranda haha right on man. Props on being bilingual
@camachobojorquezjuankevin1771
@camachobojorquezjuankevin1771 3 года назад
Thanks for the video!! I was lost with guides provided by Microsoft and this was all i was looking for
@OsbornePro
@OsbornePro 3 года назад
Thanks appreciate it. I know that feeling
@1Bosh777
@1Bosh777 2 года назад
bro you are amazing, and expert in what you doing!!! great Job, never seen someone go in depth for LDAPs, I hope you make more great videos like that!!
@OsbornePro
@OsbornePro 10 месяцев назад
Thanks for watching! I appreciate your support!
@RodrigoLelesMiranda
@RodrigoLelesMiranda Год назад
Hi Rob, ❤ another helpful videos, thanks for sharing. If I could ask you, make a full video explain about CA. Everything that i see you doing is using internal CA, and this is very needed ❤❤❤❤
@OsbornePro
@OsbornePro Год назад
Thanks for watching I appreciate the support. I will put it on my list
@JasonPhillipsXeariaN
@JasonPhillipsXeariaN 2 года назад
Thanks for the video. It has helped me a lot in securing LDAP for the CMMC requirements for our firewall integrations. Also thought for a second it sounded like you were saying L desu when you mis-spoke trying to say LDAPS lol. Hope you get the reference.
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching! I love hearing when people are able to get that going. That is not ringing a bell, what is L desu? Did I miss out on something
@JasonPhillipsXeariaN
@JasonPhillipsXeariaN 2 года назад
@@OsbornePro That is a hard one to explain If you haven't watched the Japanese or subbed version of Death Note. One of the characters L sometimes says it as shortened version of watashi wa L desu to say who he is.
@237311
@237311 Год назад
Useful video. Awesome job bro! Please make a video on how to configure Linux devices to use LDAP over SSL. Thank you!
@OsbornePro
@OsbornePro Год назад
Thanks for watching! Linux devices only need to trust the Root CA certificate to use LDAPS successfully. To join a Linux server to a Windows domain and configure LDAP authentication is a good idea for a video thanks
@237311
@237311 Год назад
@@OsbornePro Thanks. Is the imported certificate can only be a valid cert to use for Linux clients? Or does a third party certificate also work?
@OsbornePro
@OsbornePro Год назад
@@237311 as long as the certificate is trusted it will work
@237311
@237311 Год назад
@@OsbornePro Is there a PowerShell command to check for LDAP authenticated Windows clients?
@cesarcalva9277
@cesarcalva9277 2 года назад
Thank you.. It is a very clear explanation on what has to be done for LDAPS
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching!
@alexk.1841
@alexk.1841 Год назад
Hi, thanks for the great video, it really helped me. Good stuff, looking forward to seing more from you!
@OsbornePro
@OsbornePro Год назад
Thanks for watching! Appreciate the support
@wenwang473
@wenwang473 2 года назад
Thank you so much for doing these excellent videos related LDAPS!
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching! Glad they were helpful
@pandanck
@pandanck 2 года назад
Thanks so much!! one of the best videos of Active Directory
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching, glad it was helpful!
@rob.DaSilva
@rob.DaSilva 3 года назад
best Video/turorial for this Everywhere i've looked for. thank you so much for sharing..
@OsbornePro
@OsbornePro 3 года назад
Thanks appreciate the feedback!
@letmemakeitsimple4655
@letmemakeitsimple4655 2 года назад
That was very helpful. Keep sharing such content. I really appreciate your efforts.
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching and the support! Will do!
@mcdmofr
@mcdmofr 2 года назад
Thank you for the tutorial, I notice that the workstations with the "None" parameter on the local gpo cause ID 2885 on the DC, however the openings of sessions on these workstations on the domain always work. You indicate in your video that connections can no longer be made if the DCs require forced LDAPS connections. Did I forget something?
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching! LDAP requests will still be made and will go through. The type of LDAP request that is clear text is an LDAP bind. Anytime an LDAP bind is performed by a client it will force the use of LDAP over SSL
@mcdmofr
@mcdmofr 2 года назад
ok thank you, but why my firewall watchguard can no longer connect to ldap without adding the ldaps option as well as the domain certificate while my w10 clients can always connect to the domain with the gpo on "None" for LDAP signed connections ?
@OsbornePro
@OsbornePro 2 года назад
@@mcdmofr if you set the Default Domain Controller Group policy object to only accept LDAPS binds, the server will require the LDAP binds to be secured from external devices like your firewall.
@mcdmofr
@mcdmofr 2 года назад
@@OsbornePro thank you it's clear
@robertwright2080
@robertwright2080 Год назад
Great vid and explanation!
@OsbornePro
@OsbornePro Год назад
Thanks for watching appreciate the support!
@buko320
@buko320 2 года назад
Thanks, great video.
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching!
@e.r.5034
@e.r.5034 3 года назад
You lost me...early in the video you said to use the Network service account when configuring things instead of a dedicated service account for LDAPS. Later you used a service account for LDAPS. Was there a reason for the change? If we stay with the option for Network Service account, what changes does that cause when working where you imported the certificate and restarted the services?
@OsbornePro
@OsbornePro 3 года назад
Hey thanks for watching! As far as functionality goes it does not matter whether you use a dedicated service account or the default service account. The purpose of a dedicated service account is to limit the accounts interactions with other services if it is ever compromised. I can get lost in thought doing the videos and probably was thinking about something else during the time I should have changed it
@MiguelGomez-dw8rb
@MiguelGomez-dw8rb Год назад
Hello Osborne, Great video! I have a question for you, I noticed you had a policy for laptops, what exactly did that policy consist of? Will this setup work without that policy for devices?
@OsbornePro
@OsbornePro Год назад
Thanks for watching! The LDAPS policy would only be applied to Windows domain joined devices. The LDAP client setting tells client machines to use LDAP over SSL whenever performing LDAP binds against the DC. The certificate configuration for LDAPS will work on its own. However, the windows clients are not being told to use it without that setting. You could still trust the root CA certificate on any Unix based device and successfully tell the device to use secure LDAP binds. I had other policies in the video that were from other videos I had done or just playing around.
@MiguelGomez-dw8rb
@MiguelGomez-dw8rb Год назад
Thank you for the quick response! Perfect! This will definitely help out 👍🏼
@stevensnead4833
@stevensnead4833 5 месяцев назад
Thanks your the video. The only thing I had a trouble with is how to setup the cert auth. I see you need to use enterprise CA that would be a help if you put that in.
@OsbornePro
@OsbornePro 3 месяца назад
Thanks for watching! The length of the video may be deceptive in how much needs to be done. Prerequisites: 1. Certificate Authority a. Contains an LDAPS Certificate Template to issue to DCs 2. Domain Controller a. Assigned the LDAPS certificate from the CA b. LDAPS Certificate template attached to the NTDS service You do not necessarily need an Enterprise CA however it does make the implementation simpler. The LDAPS certificate template can likely be obtained from whatever you are using as your Certificate Authority. The tricky part is the LDAPS certificate can not use a typical SSL certificate such as one you would attach to HTTPS. This is why the service is unable to be a wildcard certificate and it cannot have a Subject Alternative Name.
@quytran1203
@quytran1203 2 года назад
Hi Osborne, great tutorial! You are amazing. I just have one question: "if the DC's policy is "required" and the client machines' GP policy is "none" (and are not installed the required certificates in their stores), are they still be authenticated by plain LDAP?" What is the difference between LDAP bind (which enforces SSL if the policy is set to "required") and LDAP connect (which can still use plain LDAP)? Why windows client can connect with LDAP but devices like CISCO ASA requires LDAPS? (I saw this question in a previous comment). Appreciate your feedback! Thank you so much!
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching! If the Domain Controllers policy is set to require signing, the LDAP Clients are required to have their policy set. The client policy can NOT be set to "None". If the clients do not trust the certificate issuer the SSL connection will not be successful. The below links are the references for your question. LDAP is a language used to query a directory service. The types of LDAP requests can be Add, Bind, Delete, Modify, or Unbind. An LDAP Bind request authenticates a client to the directory server. Active Directory is not the same as an LDAP server but it does understand the language. This is why non-Windows devices need to perform authentication requests using LDAP Binds where Windows clients can utilize I believe Kerberos. (EDIT: I just looked into it and LDAPv3 is able to use SASL authentication, Simple/LDAP Bind, or Anonymous. The use of SASL is what allows Kerberos and TLS to be used) I am not familiar with when exactly Windows clients use LDAP Binds but they do seem to still be utilized based on Microsoft's recommendations. When you tell the Active Directory server to require signing for LDAP the Cisco ASA for example, needs to trust the Root CA that issued the LDAPS certificate. Otherwise the initial connection will fail. The alternative to an LDAP Bind would be allowing anonymous authentication which would allow anyone who can communicate with your Domain Controller to retrieve directory information from it. CLIENT: docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements SERVER: docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements
@quytran1203
@quytran1203 2 года назад
@@OsbornePro Dear Osborne, you are amazing! Thank you so much for your explaination!
@BGPNetworks
@BGPNetworks Месяц назад
Guys, real Good Video, Just one question about certificate Authority, how about if the domain controller is the certificate authority as well and there is already a root cert installed, How does this step differ?
@OsbornePro
@OsbornePro Месяц назад
@@BGPNetworks thanks for watching! It is not recommended to user your DC as a CA however, that should not affect the setup. The CA cert still needs to be trusted by the server and clients. It is still able to do what you need it too
@Dreamy_daisies724
@Dreamy_daisies724 2 года назад
Hello Rob, Thanks for the detailed explanation. I'm trying to setup my own lab, I'm not having good expertise on AD and DS. Would like to know whether CA server & Domain Controller can be the same?
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching! You are able to place the CA and AD on the same server. It is not considered a best practice to do that in a production environment. There is no harm in doing it in your test environment
@Dreamy_daisies724
@Dreamy_daisies724 2 года назад
@@OsbornePro thank you 👍
@garethofer1619
@garethofer1619 10 месяцев назад
Great Video. I'm going to have to lab this before introducing to a real environment. Any potential impacts that could arise if I introduce this to a already working domain ?
@OsbornePro
@OsbornePro 10 месяцев назад
Thanks for watching! As long as you follow the testing steps I outlined there won’t be any issues. If you were to apply the DC enforcement policy first without applying the client policy it will break authentication on the clients. Any non-windows devices performing secure ldap binds will be logged by 2889 on the DC and will need to have their config updated and the ldaps’ root ca certificate trusted in order to use LDAP over SSL. Anytime the root ca certificate expires it will need to be updated in ldap client devices. Some people don’t enforce secure binds on the DC as a just in case and instead receive email alerts whenever an insecure LDAP bind generates event id 2889 That is pretty much the extent of what could happen if not carried out properly. The worst thing would be enforcement on a DC where clients have the opposite configuration via group policy. That would require rejoining a whole lot of devices to the domain
@OsbornePro
@OsbornePro 9 месяцев назад
@@garethofer1619 Definitely, that is no problem to do
@Killerpixel11
@Killerpixel11 3 года назад
We're looking at implementing this, at least as a test case and I was the lucky one chosen. This seems to be a comprehensive guide and exactly what I need. Just two questions I have regarding this. 1) Does the LDS service need to be set up identically on every DC in the forest? I'm assuming so, but I'd like it confirmed. And 2) in my prospective test environment, the certificate authority is installed on one of the domain controllers, and it functions as a RADIUS for WPA Enterprise (yay). I can already use LDP.exe to connect to that one on 636 SSL. Does it need additional work or can it be left as is? Thanks for any reply.
@OsbornePro
@OsbornePro 3 года назад
Right on thanks for watching! I would suggest doing so however the LDS service does not need to be installed for LDAPS to work. I included so if the environment needs to add the service at another time and the domain controller is set to force SSL usage, someone who watched the video doesn’t blame me for it not working haha. I would suggest having the domain controllers latch so if it is installed on one install it on the other. As long as you are able to connect to 636 it should mean it is working. The certificate is not assigned to the service by default so if you or someone else has not done that it will need to be done to attach the LDAPS certificate to the port.
@Killerpixel11
@Killerpixel11 3 года назад
@@OsbornePro Okay, so I must've misunderstood then. The LDS service is not technically required for LDAPS at all? Then the question is how to roll out LDAPs on my other DCs. I can connect to the one running the certificate authority on 636, no problem. On the others, which are only DCs with no other services, I cannot. Is it as simple as registering a cert for those and attaching them to the NTDS service?
@OsbornePro
@OsbornePro 3 года назад
@@Killerpixel11 Exactly you only need to skip installing the AD LDS Service in the video. The CA needs to have its certificate in the trusted root and trusted intermediate authority certificate stores on each domain controller and LDAP client. This trusts the certificates issued by that CA. Then with the LDAPS certificates attached to that service/port you are good to go. It is fairly simple. It mainly about making sure there is no broken communication before enforcing anything
@Killerpixel11
@Killerpixel11 3 года назад
@@OsbornePro Well then, I know what my monday will entail. Thank you for the replies, this helped immensely.
@OsbornePro
@OsbornePro 3 года назад
Thanks brother glad to hear it
@yangpaulhernandez976
@yangpaulhernandez976 2 года назад
Hello, I hope not to cause inconvenience. I talk to you; I have a vulnerability on my server in the LDAP service, since I don't use an encryption medium (SSL certificate), I think I can remedy this vulnerability by applying the configuration you made. The problem is that when trying to install the role that you mention in the video, it does not install, I have updated my operating system and I have tried to install the role. Do you know if there is another way to fix the LDAP vulnerability?
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching! You can skip installing the AD LDS role and just move on to the certificate assignment
@Testmecya2023
@Testmecya2023 2 года назад
Great video. I'm very familiar with the process, however is there a way to auto renew the certificates? This becomes a pain once a year :). Additionally, do you have any recommends how to deploy the root certificate to the linux servers (configured for SSSD)? Or auto enroll linux devices that are on the network with our CA? Obviously windows is easy with GPO, but linux becomes a pain :). We do use AirWatch but that's for MDM. Any feedback would be appreciated.
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching! There is not a way to automatically manage Linux certificates unfortunately. You could write a script on your Linux devices that automatically obtains the Root CA certificate. Typically Root CA certificates in Linux go into the directory /usr/local/share/ca-certificates and get updated using the "update-ca-certificates" command. Also I typically use dpkg-reconfigure ca-certificates which I feel is easier to ensure your new cert is added because of how visual it is when doing the process manually. The below script should be a good starting place. If you need help refining it just let me know what you need ###### SCRIPT TO UPDATE ROOT CA IN LINUX ######## # # GET THE ROOT CA CERTIFICATE ONTO THE LINUX DEVICE # EXTRACTION METHOD FROM PFX FILE------------------------------------ echo "[*] This is an openssl command to extract the Root CA's from a PFX file if needed (optional)" openssl pkcs12 -in certs.pfx -cacerts -nokeys -chain -out /tmp/cachain.pem -passin pass:"Password123!" # RED HAT METHOD TO GET ROOT CA FROM WEBSITE # Red Hat claims hammer can be used in the below manner to obtain the Root CA from a site. I have not tested this # hammer --fetch-ca-cert server.domain.com # OR DOWNLOAD ROOT CA CERT FROM AN INTERNAL LOCATION echo "[*] Download the Root CA certificate from an available network location or internal site" curl -k server.domain.com/cachain.pem -o /tmp/cachain.pem # UPDATE YOUR TRUSTED CERTS------------------------------- echo "[*] Copy the certificate to the appropriate directory to update your trusted certificates" sudo cp -v /tmp/cachain.pem /usr/local/share/ca-certificates/domain-cachain.pem # Update the your trusted CA's on the linux device sudo update-ca-certificates # VERIFY IT IS NOW TRUSTED--------------------------- echo "[*] Verify the certificate is trusted" openssl verify /usr/local/share/ca-certificates/domain-cachain.pem echo "[*] Test the LDAPS connection" openssl s_client -connect dc.domain.com:636 -CAfile /usr/local/share/ca-certificates/domain-cachain.pem ###### END SCRIPT #######
@Testmecya2023
@Testmecya2023 2 года назад
@@OsbornePro sorry I meant the ldaps on the domain services certificate
@Testmecya2023
@Testmecya2023 2 года назад
Renewing the ldaps active directory domain services certificate. Auto renews, It’s a manual effort right?
@OsbornePro
@OsbornePro 2 года назад
Ah sorry. Yeah there is no way unfortunately to auto-renew certificates on Linux from a Windows CA. If you ever find one please let me know. Yes you care correct it is a manual effort. Saying that reminded me I meant to write a PowerShell script to reassign the new LDAPS certificate to the NTDS service. I will post the github link to it here once I write it. Ill try and get that done today or Monday. The LDAPS Certificate will be auto-renewed as long as it is set up to do so
@peterdeighan9966
@peterdeighan9966 2 года назад
Great video, very helpful. My question is: can you enable LDAPS on a non-Domain Controller? If so, are there any security concerns or special considerations? We have multiple DCs and I’m not comfortable with enabling LDAPS on each, if possible. Cheers!
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching! Typically you have to point a service to only one LDAPS server, so if you only have one server hosting that it should not be an issue. LDAP stands for Lightweight Directory Access Protocol. It is basically a protocol used by Active Directory services for transferring info about objects in the directory from your Domain Controller. It will always use LDAP. You can disable LDAP on clients by not joining them to a domain and adding firewall rules to block the ports. If you have a directory server and you disable LDAP no clients will be able to authenticate to it if that answers your question. LDAPS is only used for secure LDAP binds which is a simple/basic authentication method for transferring credentials. That happens in clear text so it is a good idea to encrypt any of those communications. Typically you will only be securing like GiT services, web apps, and VPN connections that authenticate users to your DC. Typically all other methods use port 389 and don’t transfer any sensitive info in clear
@cliffpietrucha517
@cliffpietrucha517 3 года назад
Great videos, very helpful and much appreciated. Was wondering if I can request a video to secure printer server communication on a domain environment. Currently have a Server 2012 R2 running a print server with multiple biz hub scanner and copiers, looking to further secure the printers. Scanning is currently done with direct access using Office 365 user mailboxes and SPF records. Anyway to secure printers printing on the network?
@OsbornePro
@OsbornePro 3 года назад
Thanks for watching, appreciate the feedback! I will definitely take a look at doing a video on that. If you are familiar with a tool called PRET (github.com/RUB-NDS/PRET), you may already know printer languages can be used to execute commands on the printer without the need for a password. This can be used to do things such as reset printers, damage printers, and steal documents. Full disclosure I have looked into trying to lock this down before unsuccessfully. I remember seeing something on only allowing the print server to communicate with the printers using printer language or something along those lines. I was not able to successfully find good information on this. It may be as simple as defining ACLs or firewall rules. I will have to play around to find out for sure. If anyone else has experience with this I would be happy to hear about it. If I am not able to find out how to do that I can at least cover other best practices. I can also say to never have your printer server role installed on a domain controller. An attacker can use unconstrained kerberos delegation to obtain Domain Admin privileges remotely. It will likely be one of the first things they check for once a DC is discovered.
@myhighmusic9206
@myhighmusic9206 5 месяцев назад
Thanks for this video works great. What happends if i remove the instance and the role is ldaps still active then? I need te demote the dc running this instance...
@OsbornePro
@OsbornePro 3 месяца назад
Thanks for watching! You actually are do not need to install the Active Directory Lightweight services role and it will not harm anything to remove it. That was bad information circulating at the time I released the video. You do not need to install that Feature and it can be safely uninstalled. As long as the NTDS service is running LDAP and LDAPS are available. The certificate attached to the NTDS service is required and the clients need to trust the Root CA that issued it. If you are moving to a new DC you will need to request an LDAPS certificate for it and attach it to the NTDS service. Once that is done simply point whatever third party apps you need to towards the new DC.
@scottreeve5716
@scottreeve5716 2 года назад
At 6:44 you have "Certificate Templates" but I don't see that. I see all of the others. Windows Server 2022 for what that's worth. Can you please advise?
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching! Make sure you are opening the “Certificate Authority” add in in MMC and that you have Enterprise Admin or Cert Admin permissions. That snap in connects to your CA and should show that green check mark. The Certificate Templates tree will be there
@RodrigoLelesMiranda
@RodrigoLelesMiranda Год назад
Rob another amazing class, it is possible update this cenario to win 2022? Could explain how' s the behavior and whats i needed to do to update to Windows 2022.
@OsbornePro
@OsbornePro Год назад
Thanks for watching! I will make an updated video for that this weekend for server 2022
@RodrigoLelesMiranda
@RodrigoLelesMiranda Год назад
Thanks a lot for sharing a lot and exclusive knowledge. Rob i never seen stuff like that. If i am not ask a lot, i have another doubt, if i have 5 domain controller i need to do that in each one? Thanks again...
@OsbornePro
@OsbornePro Год назад
@@RodrigoLelesMiranda no you really only need one DC with LDAPS I would say. The. You can point third party applications to it that use LDAP Bind requests. I am not familiar with any behavior really where Windows devices make LDAP binds
@RodrigoLelesMiranda
@RodrigoLelesMiranda Год назад
Rob very thanks for your help
@OsbornePro
@OsbornePro Год назад
@@RodrigoLelesMiranda No problem thanks!
@mywork-gl3vs
@mywork-gl3vs 3 года назад
Hi Osborne, Thank you very much for your video. I am having issue when requesting Certificate in DC. In Certificate Enrollment window it showing (Heading)Certificate types are not available. (Under heading) You cannot request a certificate at this time because no certificate types are available. If you need a certificate, please contact your administrator. At the bottom i select the Show all template check box , i can see all the cert including the LDAP cert that i created from Kerboros Authentication template. Here all the certs STATUS is Unavailable. And the LDAP certs status is "A Certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider" A valid certification authority (CA) configured to issue certificate based on this template can not be located, or CA does not support this operation, or the CA is not trusted. My lab set up: -I have installed DC first 2016 -Then domain joined the CA and configured the CA(2016) Can you help? Let me know if further info required. Kind Regards
@OsbornePro
@OsbornePro 3 года назад
Sorry for the delayed response I did not realize I needed to approve this comment and thought you it was a post remove because you found the issue. That was my mistake. If you are not able to choose the certificate to request it means the user you are using does not have permissions to request that certificate using that template. Try recreating the template and add your user to the "Security Tab" of the certificate template to ensure you can make the request.
@leonardoruiz6006
@leonardoruiz6006 Год назад
Hey Rob, I'm facing an issue on a Samsung Printer M4070FR where even adding the CA cert on its configuration page, I'm getting eventID 2085 saying the printer and the LDAPS service can't find a common cipher to wrk with. Windows machines are ok and Linux servers with system codes that integrate using LDAPS run smoothly once I configure the CA cert to recognition. Already check printer firmware and it uses openssl3. Am I missing something or I would have to try enable insecure cipher on DC GP manager in order to make it work with the Samsung Printer ? Any thoughts would be highly appreciated
@OsbornePro
@OsbornePro Год назад
Thanks for watching! The printer is probably older and not capable of using modern ciphers. You may be able to find out what is available by using this cmdlet. You will likely need to enable CBC using Enable-TlsCipherSuite learn.microsoft.com/en-us/powershell/module/tls/enable-tlsciphersuite?view=windowsserver2022-ps This cmdlet shows you negotiated protocols github.com/tobor88/PowerShell-Blue-Team/blob/master/Test-SslOptions.ps1
@leonardoruiz6006
@leonardoruiz6006 Год назад
@@OsbornePro Thanks for your reply. I'll dig into it!
@OsbornePro
@OsbornePro Год назад
@@leonardoruiz6006 no problem
@harrytrueman4216
@harrytrueman4216 3 года назад
Nice video, I thought all we needed to do was have a certificate on the dc. The microsoft doc does not say you have to install the lds role?
@OsbornePro
@OsbornePro 3 года назад
I actually don’t fully understand what AD LDS role does. My best understanding is it adds some attributes and functionality to Active Directory with the communication happening on the local domain controller. I included it to ensure those communications are encrypted for anyone who wants to set their domain controller GPO setting to require encryption. This way if that setting is configured and the AD LDS role gets added next year there is no broken communication
@Akira29H
@Akira29H 2 года назад
Great video tutorial better than MS.. I have question. I have Linux and will be using LDAP to query to my DC. If i will implement LDAPS. Do you have any steps on this? second qs is I have two DCs should i just make 1 DC as the main LDAPS? or i should perform the same installation on the second DC? thank you
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching! On the Linux client device you will just need to add the RootCA certificate that assigned your LDAPS certificate to your trusted certificates store. Export the root ca certificate in Base64 format. Then save the file into /usr/share/ca-certificates/mozilla Make sure the file extension you use matches whatever is in that directory. I forget if it’s cer or crt. Then run the command sudo dpkg-reconfigure ca-certificates That will trust your certificate and allow you to use LDAPS. This should help you configure the rest www.golinuxcloud.com/configure-ldap-client-auth-ldap-server/ I typically set LDAPS up on both but you can also just use one which is less management to take care of on your part
@makarasan4828
@makarasan4828 3 года назад
this video really helpful. I have some issue with some third party product need LDAPS to communicate with AD and currently I am using LDAP and can't move to LDAPS immediately. my question is 1. can I enable both LDAP and LDAPS on the same server? 2. does it impact any service if I enable both? implement
@OsbornePro
@OsbornePro 3 года назад
Hey thanks for watching! Yes it is fine to leave both LDAP and LDAPS enabled. You should actually never disable LDAP because it is still used. The purpose of LDAPS is to secure LDAP binds which send credentials in clear text. You can still choose to use LDAP. Yealink phones for example are not able to trust custom certificate authorities. So to sync an address book to the phone using insecure LDAP binds would be required in that situation. It will not negatively hurt any service
@michaelem7883
@michaelem7883 Месяц назад
no need for that hassle if the LDAPS is to be used. its enough to have certificate for dc in personal store. also if you enable signing. its should be stated that in corp env you should enable NTDS logging to see who is using simple bind before you wreck havoc =) .also there is no way to force any one except windows clients. if applications are setup to use simple bind they will send plain text passwords without possibility to auth
@kT2015N
@kT2015N 3 месяца назад
Can I have 2 LDAPS services on two different DC in the same domain.
@OsbornePro
@OsbornePro 3 месяца назад
Thanks for watching! Yes you can. Just have to assign each DC its own LDAPS certificate where the FQDN of each individual DC is in the Subject of the certificate.
@yannickhache643
@yannickhache643 3 года назад
Hi, your video was very useful but i'm running into a little issue. I was able to do the steps up until you do the Certificate enrollment. I am getting an error stating that my CA cannot be located, or that does not support this operation or it's not trusted. It's a brand new CA server i made specifically for this purpose. Maybe configured it wrong..Any tips?
@OsbornePro
@OsbornePro 3 года назад
Hey thanks for watching! My initial thoughts on that would be did you install an Enterprise CA or Standalone CA? Stand-alone CA’s do not use Active Directory directory services to issue certificates. Is the CA server joined to the domain and is the CA root certificate installed in Trusted root and intermediate authority certificate stores on the DC/domain? Can the DC ping the CA and vice a versa? Have you modified RPC or WMI permissions in any way?
@yannickhache643
@yannickhache643 3 года назад
@@OsbornePro I think the part that got me was : CA root certificate installed in Trusted root and intermediate authority certificate stores on the DC/domain? I check this morning and it was there and i was able to import my LDAPS cert on both DC. Thanks again !
@OsbornePro
@OsbornePro 3 года назад
@@yannickhache643 right on! Happy to help
@maxthed0gtv212
@maxthed0gtv212 2 года назад
I am having a rpc server is unavailable error. what could be the wrong in my setup thank you sir, great video by the way
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching! When creating a CA on a server different from your DC you may get an RPC not available error. Typically the reason for this is you need to add the security groups "Domain Users", "Domain Computers", and "Domain Controllers" to members of the "Builtin" Active Directory group "Certificate Services DCOM Access" Make sure you have your DC set as the DNS server for your CA server as well which could also cause that touble
@killachang
@killachang 4 месяца назад
When I request new certificate from the DC, it is showing all my certificates status as unavailable in include LDAP one. Do you know how to fix it? Much appreciated.
@killachang
@killachang 4 месяца назад
I finally figured it out. My CA root certificate was expired. Once it is renew, I see the LDAP certificate is now available.
@OsbornePro
@OsbornePro 3 месяца назад
Thanks for watching! Right on appreciate you sharing that. My approach would have been checking RPC and Windows Firewall. That did not even cross my mind.
@mcdmofr
@mcdmofr 2 года назад
Hello, why install the AD LDS role? is this role required for LDAP over SSL to work?
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching! No the AD LDS role is not required for LDAPS to work. You are only required to assign the certificate to the NTDS service
@rickazud5291
@rickazud5291 2 года назад
Do you normally pass the LDAPS port from the firewall to the domain controller, set up a read only domain controller in the DMZ, or something along those lines? Planning on the deployment, was interested in your thoughts on the best way to secure this for third party integration.
@OsbornePro
@OsbornePro 10 месяцев назад
Thanks for watching! If you can not use SSO and need to use LDAP for authentication I would set that up as you mentioned. I would have a secondary DC in the DMZ with a port forward on the firewall with a whitelist and ACLs if possible.
@Live4thamuzik
@Live4thamuzik 10 месяцев назад
This video is excellent! I have one SSO app for my firewall installed on my DC stopping me from requiring signing on the Clients and Domain controller. I have installed the Cert created by following the video into my firewall and on the SSO app itself but the DC still throws event ID 2889 for all SSO traffic negotiated by the firewall. Is this a case where the Application Directory Partition is required? Here is what I did to import the LDAPs cert on the Agent and Firewall- Install cert on AD agent: • Open .pfx in KeyStore Explorer • Export PEM as .crt and export private key as .key • Copy .crt and .key files to DC • Open FSSO Agent on DC • Run as Admin • Advanced Settings • SSL Certificates tab • Select .crt file and .key file • type private key Install cert on firewall: • Open .pfx in KeyStore Explorer • Type password • Double-Click Entry Name of Cert • Select top level cert (CA for the Domain) • Click PEM • Click Export • Rename and save as .cer • save file • Login to FortiGate (FG) • Go to System > Certificates • Click Create/Import • Select CA Cert • Slecet File • Click upload • Choose .cer file • Click OK • Cert should show up in System > Certificates under Remote CA Certificates • On the FG, navigate to Security Fabric > External Connectors • Select FSSO Agent on Windows AD • Toggle on Trusted SSL certificate and select the imported CA certificate
@OsbornePro
@OsbornePro 10 месяцев назад
Thanks for watching! If you are seeing insecure LDAP Bind requests, it is because the Agent or Firewall is configured to use normal LDAP Bind requests instead of encrypted ones. The steps you mentioned relate to trusting the certificate. You will also need to tell the firewall/agent to use LDAPS. I found this FSSO Agent: community.fortinet.com/t5/FortiGate/Technical-Tip-Fortinet-Single-Sign-On-FSSO-Agent-SSL-connection/ta-p/210850 KeyStore explorer is a Java thing. Java keystore is only capable of trusting one certificate. The Java Keystore exists because Java does not trust certificates found in the Windows Certificate stores. Windows applications will not know to look at the Java Keystore for trusted certificates. Java applications do not look at the windows certificate store for trusted certificates. You should not need the private key in a separate file. The LDAPS certificate is exportable so you can install it on the NTDS service. You only need export the Root CA certificate and trust that on the firewall. The FSSO agent uses an LDAP dropdown to select your server according to this. This leads me to believe the Firewall LDAP server you create is responsible for the configuration of LDAP over SSL docs.fortinet.com/document/fortigate/7.0.5/administration-guide/460616/fortinet-single-sign-on-agent For your LDAP over SSL configuration, at the below document in Step 2 "2) Create a new 'LDAPS' server in the GUI and select the imported certificate:"; there is an image on how the LDAP over SSL server should be configured. Your "what I did" steps did not mention where you configured LDAPS which makes me think it could have been overlooked. community.fortinet.com/t5/FortiGate/Technical-Tip-Configuring-LDAP-over-SSL-LDAPS/ta-p/189972
@Live4thamuzik
@Live4thamuzik 10 месяцев назад
@OsborneProLLC Thank you! I'm starting to think using the Keystore explorer to export .cer and .key files for the agent is where I went wrong. All of the cert files I used to import on the fortigate and the agent were exported from the .pfx using keystore explorer. I went back and looked at the fortigate, I do have LDAPS selected in the external connectors setting. I will revisit this Monday and start from scratch with the FSSO.
@OsbornePro
@OsbornePro 10 месяцев назад
@@Live4thamuzik right on sounds good. Have a great weekend!
@Live4thamuzik
@Live4thamuzik 10 месяцев назад
@@OsbornePro Fortinet Support and I were able to confirm that I have the FSSO and DC agent are setup properly to use LDAPS. After doing some packet captures on the FortiGate and the Domain Controller, we can see that all traffic is being sent over port 636. The issue that is causing me to get Event ID 2889 is that when The Fortigate sends "Client Hello", my DC responds with "Server Hello, Change Cipher Spec" instead of "Server Hello, Certificate, Certificate Request, Server Hello Done". Essentially my cert is not being passed in the 3-way handshake. As part of my setup when following this guide, I chose not to install Certificate Authority on my Domian Controller. I elected to spin up a new 2022 server VM in vCenter and only install the role of Certificate Authority on that server after giving it a static IP and DNS name. Is there something I need to do to have the cert passed in the handshake? Web enroll via IIS?? I am starting to wonder if maybe I should install ADCS on my DC as a subordinate CA or start over by having the DC as the CA (even though, I understand it is best practice not to do that.) What are your thoughts? Do you have any recommendations for resources to brush up on my lack of understanding SSL and Certificate Authority? I am hitting a point where I feel like I might need to pay for help to finish this project as I am sure the other SSO apps I used that pass through a SNAT may trigger the same 2889 event.
@Live4thamuzik
@Live4thamuzik 8 месяцев назад
@@OsbornePro I was finally able to get this working! I went with a 2-Tier PKI (Offline Standalone Root CA server 22 & Enterprise Subordinate CA server 22). RootCA has CRL and AIA extensions pointing to SubCA for issuing, verification, and revocation. Template was made on Subca, I did change some settings though. Key componant to this was Fortinet tries to verify the CA over TLS 1.3. In server 2003-2019 this is not supported. Server 22 supports TLS 1.3 but is is disabled by default. Needed to add reg keys and dword values to enable this followed by a reboot. Verified TLS 1.3 with "IIS Crypto GUI.exe" tool. Had to upload the RootCA.cer file to FortiGate as CA Cert and uploaded the ldapspk.pfx to the Fortigate as local PKCS12 file. Fortigate now is able to verify the CA using the LD DS LDAPS service. Cert is used for Directory Lookup, binds and Application Data on TLS 1.2. FortiClient SSL-VPN uses TLS 1.3 for verification.
@che-love-4ik314
@che-love-4ik314 2 года назад
How to redirect ua ru gov to com?
@invenorofstaw7570
@invenorofstaw7570 7 месяцев назад
hoping this still works my proff is hounding me to get this code done that connects to a server using ldaps
@OsbornePro
@OsbornePro 7 месяцев назад
Thanks for watching! Yes this process is still the same today. You don’t need to install that Rile and Feature in the beginning. Just need to assign the certificate to the port and trust it on your client. Good luck on your project
@visakhmusic3866
@visakhmusic3866 3 года назад
Hello sir, Can you show me about create ldaps Certificate ? I follow you all step but i missing LDAPS Certificate available when i request.
@OsbornePro
@OsbornePro 3 года назад
Check your certificate templates permissions. If you have more than one domain controller the other possibility is the domain replication needs to happen.
@invenorofstaw7570
@invenorofstaw7570 7 месяцев назад
i do not have laptop or desktops in my domain, im trying to connect with a python script is this part necessary? sorry I'm a first year
@OsbornePro
@OsbornePro 7 месяцев назад
Thanks for watching! If you are trying to connect with a Python script you do not need to enforce anything with group policy. You will need to just attach the certificate to the NTDS service on your domain controller. Your Python script may need help trusting the certificate if you are on a host that doesn’t trust the root ca that issued the LDAPS certificate
@invenorofstaw7570
@invenorofstaw7570 7 месяцев назад
@@OsbornePro okay, thank you for the quick response. I will try this when I'm back at the lab tomorrow. Much appreciated!
@OsbornePro
@OsbornePro 7 месяцев назад
@@invenorofstaw7570 no problem happy to help
@ameyakulkarni5844
@ameyakulkarni5844 2 года назад
Hello Sir, great video. I am stuck at a point where I can see the LDAP certificate in certlm, but when i try to export it, i cant find the .pfx file in any of the folders. Also i cant see the Encryption selection dropdown on Certificate export wizard. am i missing any step ? Thanks
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching! When you export the certificate, are you ticking the box to export the private key? If you can not tick that box you may need to re-create the certificate template where you enable the exporting of the private key. Then reassign the certificate to your DC and try exporting it with that box ticked.
@237311
@237311 Год назад
@@OsbornePro Useful video. I dont see the "box to export the private key" as an option when Im exporting the certificate.
@OsbornePro
@OsbornePro Год назад
@@237311 you will need to remake the template on your Root CA and tick the box that says mark key as exportable. Then reassign the certificate to the device. That will ungray that box
@237311
@237311 Год назад
@@OsbornePro "mark key as exportable" is not there. How did you download the file .pfx to your local folder? By the way, I've installed Certificate Authority within DC, so DC and Cert. Authority are in the same server. Or should I install them separately on a different server or what? Thanks!
@leonardoruiz6006
@leonardoruiz6006 2 года назад
Hi Rob, congrats on this really instructional video. I've used it start to finish to implement LDAPS from scratch on my company and it is working great. I'm having trouble to understand the renew "mechanism" tought. I have downloaded your git's powershell script and changed the required values but as my initial certificate only expire on 2023 I haven't been able to properly test it. I have create a scheduled task that runs the script every day on my DC. My first question is: once the script renews the certificate successfully will clients (domain windows machines) automatically pick it up without break any communication ? Do I have to setup any GPOs other than the ones you show in the video ? My second question is: in what scenario will I need to uncommented the import/export commented parts of the script ? Thanks for your time.
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching! I love hearing that right on! SCRIPT: github.com/tobor88/PowerShell/blob/master/Set-NewLDAPSCertificate.ps1 TESTING: At line 16 you can change the -ExpiringInDays parameter in the Get-ChildItem cmdlet from 30 to 365. This will make the script believe the LDAP cert needs to be renewed. CERTIFICATE CHANGES: Changing the LDAP cert will not make any difference to the Windows devices. As long as the Root CA that issued the LDAP certificate is trusted, the LDAPS certificate will work. A Root CA might expire before an issued certificate. Keep the old Root CA certificates in the client trust store. This is to ensure that certificates issued by the Root CA, before their expiration date, are still trusted. EXCEPTIONS: If you utilize Bastillion in your environment as an SSH manager, they use Jetty for web hosting. This in turn uses the Java Keystore instead of the Windows cert store for trusted certificates. Java cant trust a Root CA certificate. Javas keystore only allows you to trust 1 certificate. To use LDAPS authentication you need to import the LDAPS certificate into their keystore. If you have any Jetty web servers and want a line to add to your script/automation that imports the trusted LDAP certificate I can provide you with one. The other exception I have seen before is Alertus. Alertus required importing the Root CA and the LDAPS certificate for some reason. There may be others out there which can be a downside to some open source projects or developers who cant be experts in everything. IMPORT/EXPORT: Originally when figuring out how I could automate reattaching the certificate to the NTDS service I was thinking I would need to renew the certificate in the Computer Personal store, export it to a file, and finally import it into the NTDS store. I was able to simplify it instead and just left those old lines in the script.
@leonardoruiz6006
@leonardoruiz6006 2 года назад
@@OsbornePro many thanks for the quick reply. Understood. Keep up the awesome work. Your material trully stands out from others.
@OsbornePro
@OsbornePro 2 года назад
@@leonardoruiz6006 thanks appreicate it!
@doctorwhojr.2022
@doctorwhojr.2022 2 месяца назад
thanks a lot
@OsbornePro
@OsbornePro 2 месяца назад
Thanks for watching! Glad it was helpful
@maxime72700__
@maxime72700__ 2 года назад
Hello, to export the certificate I can't, because it is directly in your download folder, while I don't. thank you for your help 12:30 min
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching! If you are trying to export the root CA certificate I would suggest following the instructions in the section “Export CA certificate(s) from the public certificate” at the below link. docs.microsoft.com/en-us/azure/application-gateway/mutual-authentication-certificate-management
@visakhmusic3866
@visakhmusic3866 3 года назад
After i go to duplicate certificate on the certificate templates name "LDAPS Certificate" and then it not show on the Certificate Templates with LDAPS Certificate. So that i can't request certificate. Hope you can show me, How to solve. Thanks
@OsbornePro
@OsbornePro 3 года назад
After you duplicate the template (6:58) and assign your permissions (7:47), you need to tell your Certificate Authority it is a template you want being assigned (9:29). If you have more than one domain controller your replication needs to finish before the template can be assigned (10:32). With your permissions correctly set on your Enterprise CA and your domain controllers successfully replicated to the other domain controllers you will be able to request your certificate. Make sure you are able to request and assign other certificates. If you are not able to request any certificates than the issue may lie in how the Certificate Authority service was set up. Make sure you are using an Enterprise CA that is domain joined and verified as the CA for your domain.
@chrismoore8116
@chrismoore8116 2 года назад
@@OsbornePro I'm actually noticing the exact same behavior Visa reported. After duplicating the certificate with all settings properly set, it does not display in the "new" certificate window or in the certificate template window. I'm trying to run some updates and a reboot to see if this resolves it as this is a fresh CA I stood up a few months ago. So far great video, I'll update if I find the fix!
@OsbornePro
@OsbornePro 2 года назад
@@chrismoore8116 thanks for watching! If you do not see the certificate there is either a user permissions issue, a DC replication issue, or either the DC or Root CA don’t view each other as the trusted service for the domain
@chrismoore8116
@chrismoore8116 2 года назад
@@OsbornePro Funny enough, it was just impatience. lol. It took about 20 minutes to show up for some reason but after that I was good to go. Thanks!
@aliounethiaw1443
@aliounethiaw1443 4 месяца назад
When i try to do the nltest i get an error "erro_no_such_domain"
@OsbornePro
@OsbornePro 3 месяца назад
Thanks for watching. If you are running the nltest command on a device that is NOT a Windows Domain Controller there may be an issue with the trust or there is something up with the certificate trust on the client. Either of the below commands can be used to repair the trust. nltest /sc_reset:YourDomain.com Test-ComputerSecureChannel -Repair -Verbose # Run on the client device in admin powershell window Otherwise look at the System logs in Event Viewer after you do the above. Look for any events related to secure channel issues, likely with a the source Netlogon. This may help identify what exactly the trouble is.
@aliounethiaw1443
@aliounethiaw1443 3 месяца назад
@@OsbornePro ok thank you very much for your response. I will try to execute the commands. I just forgot to mention that i tried executing the command on a windows 11 in the same network and domain, on a windows 11 in another network (through internet) and on the DC itself. I got the same error in every case. Oh and the DC is also the DNS server
@aliounethiaw1443
@aliounethiaw1443 3 месяца назад
@@OsbornePro but my main issue is how to make LDAP work with iOS because iOS devices somehow dont send bind requests, only search requests from what i see through Wireshark. So i was trying to connect with SSL but apparently the iphone doesn't recognize the certificate. In Wireshark, we can see a "Unknown certificate" error.
@OsbornePro
@OsbornePro 3 месяца назад
@@aliounethiaw1443 if you are not seeing bind requests from the iOS devices they are not trying to perform authenticated searches. They may need an LDAP profile of some sort with credentials specified typically using the distinguished name as the username. An MDM solution will need to be used to push out the Root CA certificate to the devices trusted machine certificate store.
@aliounethiaw1443
@aliounethiaw1443 3 месяца назад
@@OsbornePro so i need to manually register the phone in the LDAP server using the phone's name and a password as credentials, then install the certificate on the phone via an MDM. And then i try to connect using the phone's credentials instead of the user's credentials. Is that what you mean?
@xloveusa
@xloveusa 2 года назад
What is the difference between this and auto enrollment?
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching! What are you referring to by auto-enrollment? The Certificates can be auto-enrolled for domain joined computers. Any Windows devices part of the domain can be auto assigned any computer/device certificates. Same thing for user accounts.
@ronaldriveras.2083
@ronaldriveras.2083 2 года назад
Hello, a very explained video, I have followed the steps but so far I have the following error when I want to use an LDAP that is a separate server from AD DS and I use a self-signed certificate from the computer. LDAP over Secure Sockets Layer (SSL) will be unavailable at this time because the server was unable to obtain a certificate. Additional Data Error value: 8009030e No credentials are available in the security package please your support to be able to solve the inconvenience, very grateful in advance.
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching! You will need to add the self signed certificate to the trusted certificate store on the client computer. If the client does not trust the certificate it won’t make the connection. The ldap certificate needs to have a subject name that matches the FQDN of the server.
@ravisharma1201
@ravisharma1201 3 года назад
Hi I got a project for LDAP to LDAPS migration so could you please let me know the prerequisite for this migration and do I have to do the same migration which you mentioned in your video. Please reply me asap if it's possible because I have very less time for this task. Waiting for you reply
@OsbornePro
@OsbornePro 3 года назад
Hey thanks for watching. Sure thing, You will need - A trusted Root-CA in your environment. - The CA certificate will need to be trusted by all devices that will be using LDAP binds. Windows can push this out through group policy. Network devices and Linux will most likely need you to do this manually and it will vary per service on how that is done. Anything you are using LDAP authentication for in a web app for example will be required to trust the root ca certificate in order to use LDAPS - The domain controller will need Lightweight Directory Services installed from Roles and Features - Assign the LDAPS certificate to your created ADAM service and already existing NTDS service - The DC will need a special certificate template I defined in the video to use for LDAP over SSL. - You may need to open port 636 on the domain controller firewall if it is not open/reachable by clients already I suggest following the steps in my video to ensure you don’t have to do any possible extra work due to oversights. Configure the client devices through group policy to use negotiate signing first. Once you see the clients are authenticating with success change the policy to required for the clients. Check the event logs and/or use the LDAP alert to be notified of which devices and services are still using insecure LDAP binds and follow the services documentation to trust your PKI’s Root Certificate authority before configuring the use of LDAPS on that service or device. Every domain controller in the environment you should configure LDAPS on. Each DC will need it down LDAPS cert to be assigned to the ADAM and NTDS service. In another comment I mentioned some people never plan on forcing LDAPS on their domain controller and only force it on clients. They do this in combination with the alert so they know any time insecure LDAP binds are used. If you are being rushed on the project I would suggest doing that to ensure no communication is prevented until you can safely configure that. You may want port 389 to accept binds for troubleshooting at some point as well however environments that expect stricter security may want this done all the way. That is great, we just don’t want to break any communication. A service can always be reconfigured and in the majority of cases I have seen it is not going to hurt in the way the client devices in an environment can when the forced LDAPS is turned on too early on DCs. Clients will need to be rejoined to the domain if that communication breaks. Services just need to have their config files changes or their web GUI accessed with a local service admin account to change settings in a web GUI. If you have more questions feel free to email me at rosborne@osbornepro.com
@JHSDurham
@JHSDurham 2 года назад
@@OsbornePro Hi - thank you for this video, it is very helpful. Similar to the other person's post, we are moving from LDAP to LDAPs. In your reply above could you clarify this statement " Every domain controller in the environment you should configure LDAPS on. Each DC will need it down LDAPS cert to be assigned to the ADAM and NTDS service. " Are you saying if we have 4 DCs , we need to create 4 certs, one for each DC, and import each cert to each other DC ?
@OsbornePro
@OsbornePro 2 года назад
@@JHSDurham Thanks for watching! If you are going to be pointing third party services like Cisco AnyConnect or Gitea or Palo Alto towards one of your domain controllers for LDAP over SSL authentication, you will need to perform those configuration steps on at least the one domain controller that will be expecting LDAPS requests. If you have 4 Windows Server DC’s I would suggest attaching an LDAPS certificate to each one. This is for the devices in your environment. If the clients are being required via group policy to authenticate using encrypted communications they will still be able to perform most communication but not all with the other DC’s. If they do something that requires LDAPS it’s nice to still utilize them. You can get by with just one DC configured
@JHSDurham
@JHSDurham 2 года назад
@@OsbornePro Thank you for the reply. In our case, we do have 4 static DNS entries, each the same name, but each pointing to a different IP of a DC. In our Apache config file, we point to that static DNS name for the authentication server. This way if any one of the servers is busy or down, it rolls over to another automatically. So with that in mind, based on your reply, we want to put the certification on each server. However, is this 4 unique certificates, or is it 1 certificate, the same one, imported to each of the four DCs ?
@OsbornePro
@OsbornePro 2 года назад
@@JHSDurham you will need a different certificate for each host name. There can only be one FQDN in the subject line of the certificate
@bartlomiejzuranski447
@bartlomiejzuranski447 2 года назад
32:22: "see these error msg...won't break anything"...after the reboot and connectivity tests from linux machine DNS and Intersite msg-ing wont start due to LDAPs more security is required...Access Blocked. What do I do now? ^^
@OsbornePro
@OsbornePro 2 года назад
Thanks for watching! In case you are not already aware and for future readers, group policy settings do not affect Linux machines. There is also nothing to auto manage certificates on Linux devices from a Windows Server. You need to manually trust the root certificate authority on the Linux devices and then configure them to use LDAP over SSL as it's use does not happen automatically. Since the Linux machines are not affected by group policy you can simply change the "require LDAP" setting on your domain controller so it is not required and they will be able to authenticate again. This is because nothing was changed on your Linux devices. Other Windows devices in the domain will still be configured to use group policy. After making that change on your DC, configure your Linux devices to trust the root CA and configure them to use LDAP over SSL. After trusting the Root CA on your Linux device, restart it so openssl is able to recognize the new CA. Test the certificate is trusted using OpenSSL on your Linux client and read the top output results to ensure everything is trusted. openssl s_client -connect dc.domain.com:636 # OR openssl s_client -connect dc.domain.com:636 -CAfile /usr/share/ca-certificates/mozilla/YourCAfileLocation.pem Finally configure the Linux device to use LDAPS which is beyond the scope of this video and will vary based on your distro.
@237311
@237311 Год назад
@@OsbornePro Useful video. Please make a video on how to configure Linux devices to trust the root CA, and how to configure Linux devices to use LDAP over SSL. Thank you!
@OsbornePro
@OsbornePro Год назад
@@237311 for Debian based Linux distro a the comment in this thread is typically what I do unix.stackexchange.com/questions/90450/adding-a-self-signed-certificate-to-the-trusted-list
@vetribull8318
@vetribull8318 3 года назад
Dear Osborne, Is there anyways we can connect to the Printer?
@OsbornePro
@OsbornePro 3 года назад
Yes LDAPS can be used with printer communications. You will need: 1.) To import the Root CA of the LDAPS certificate into the printers trust store 2.) Configure a user account with permissions to query Active Directory in the authenticationsection 3.) Ensure LDAP port 636 with the use of SSL is selected and tell the printer not to perform certificate verification. Certificate verification will only work if a paid certificate from a CA such as GoDaddy is purchased and used with LDAPS which is unnecessary and expensive
@vetribull8318
@vetribull8318 3 года назад
@@OsbornePro Dear Osborne.. Thank you very much for your reply. The third step is my printer don't have such a option not to perform certificate verification. How i can go about it bro?
@OsbornePro
@OsbornePro 3 года назад
I have seen that before that’s a tough spot. Check the printer documentation just to verify if you have not already and check for any firmware upgrades to see if that will allow you to do what you need to. Otherwise you have a couple possible options. 1.) Use LetsEncrypt and a script to assign a new valid certificate every month. If the printer is too old this may or may not work. I have never tried it. It would also be a lot of work to script an LDAP certificate upload to different apps and such so this may not be a good option. Just mentioning it in case it makes sense to your environment. Unfortunately wildcard certificates don’t match the criteria for LDAPS. 2.) OR Set the client GPO to required and leave the Domain Controller GPO set to None. This will prevent clients from communicating with the DC in clear text. Restrict permissions on the user account authenticating to LDAP from the printer so it is only good for querying Active Directory. It’s a bummer feeling to not be able to fully set that up because of a printer. I have a printer doing that in an environment I manage. I’ll take a look at it tomorrow and let you know if I am able to find anything new I missed that may allow that in case non of the above is a fit for you
@vetribull8318
@vetribull8318 3 года назад
@@OsbornePro Thanks Bro !. Blessed. Will give a shot..
@OsbornePro
@OsbornePro 3 года назад
Turns out the firmware upgrade was how I fixed the issue in the environment I was thinking of. Sorry I don't have one to play around with. Is there a firmware upgrade to fix yours as well?
@quaryum
@quaryum 3 года назад
you explained very well
@OsbornePro
@OsbornePro 3 года назад
Thanks for watching appreciate the feedback!
@binarytech8457
@binarytech8457 7 месяцев назад
You should delete this video because it's totally wrong. . You don't have to install Active Directory Lightweight Directory Services because you already have Active Directory Services installed (Your DC). All you need to make it work is to create certificate and configure ports. Another wrong thing in this video is about GPOs. You don't have to add "Domain computers" group to GPOs Security filtering. "Authenticated Users " group are both Users and Computers in Microsoft's world.
@user-sh5kx8cx5c
@user-sh5kx8cx5c 6 месяцев назад
Have a Snickers and calm down.
@binarytech8457
@binarytech8457 6 месяцев назад
@@user-sh5kx8cx5c I was actually calm but it bothers me when "YT experts" are making misleading videos.
@OsbornePro
@OsbornePro 3 месяца назад
Thanks for watching! Yes you are right you do not need to install that role I get asked that a lot. I initially documented my setup process during the time Microsoft was planning to force everyone to move to LDAPS and that role was mentioned in all the blog articles and clearly misunderstood. Installing that service creates a port for LDAPS and the role is easily removed. I do not see any harm. I will add a note in the description and chapter mentioning the role does not need to be installed.
@OsbornePro
@OsbornePro 3 месяца назад
That is how I felt. I did this to help teach myself and reinforce information. I would suggest try doing your own and how you think it could be better and improve the info available in the IT community. If nothing else it helps someone see what they are buying when they hire you.
Далее
Securing RADIUS with EAP-TLS [Windows Server 2019]
39:18
Cute kitty gadget 💛💕
00:23
Просмотров 4,7 млн
🫢 #tiktok #elsarca
00:11
Просмотров 4,1 млн
Securing FTP over SSL [Windows Server 2019]
28:54
Просмотров 4,1 тыс.
LDAP vs LDAPS: What's the Difference?
3:23
Просмотров 22 тыс.
Understanding Active Directory and Group Policy
51:56
Setting up an Active Directory (AD) Home Lab
54:48
Просмотров 39 тыс.