Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
LDAP over SSL (LDAPS) encrypts LDAP communications between clients and domain controllers using SSL/TLS certificates. This article shows you how to create, install, and verify SSL certificates for LDAPS on domain controllers using either Microsoft certification authorities or third-party certificate providers.
By default, LDAP traffic transmits unencrypted over port 389. LDAPS establishes an encrypted SSL/TLS tunnel over port 636 (or port 3269 for global catalog traffic), which protects authentication credentials and directory queries from interception. When you install a properly formatted certificate on your domain controller, you automatically enable the LDAP service to accept SSL connections without any extra configuration. For more information about LDAP signing and channel binding security features, see LDAP signing for Active Directory Domain Services.
Prerequisites
Before configuring LDAPS certificates, make sure you have:
Administrative privileges on the domain controller where you install the certificate
Access to a certification authority (CA):
Microsoft Enterprise Certificate Authority with published certificate templates, or
Third-party certificate provider such as DigiCert, Let's Encrypt, or Verisign
Firewall rules configured to allow inbound connections on TCP port 636 for LDAPS (or TCP port 3269 for global catalog LDAPS traffic)
LDAPS certificates must meet the following requirements:
Enhanced Key Usage extension: Must include Server Authentication (1.3.6.1.5.5.7.3.1) object identifier
Subject or Subject Alternative Name: Must contain the domain controller's Active Directory FQDN (for example, dc01.contoso.com) in either the Common Name (CN) field or as a DNS entry in the Subject Alternative Name extension
Private key: Must be present in the Local Computer's store, correctly associated with the certificate, and must not have strong private key protection enabled
Cryptographic provider: Must use the Schannel cryptographic service provider (CSP) to generate the key
Trust chain: Must be issued by a CA that both the domain controller and LDAPS clients trust
You establish trust between domain controllers and clients by configuring them to trust the root CA to which the issuing CA chains.
Create the certificate request
You can create and install LDAPS certificates using either a Microsoft Enterprise CA or a third-party CA. You must install the certificate in one of the following locations:
- Local Computer's Personal certificate store
- NT Directory Services (NTDS) certificate store
Active Directory preferentially checks the NTDS store first. Using the NTDS store provides several advantages:
- Preferential selection: Active Directory checks the NTDS store first, making it easier to control which certificate is used when multiple valid certificates exist in the Local Computer's store.
- Automatic detection: Active Directory detects new certificates dropped into the NTDS store and updates SSL certificates without requiring a domain controller restart.
- Manual refresh capability: You can trigger certificate updates by using the renewServerCertificate rootDSE operation without restarting the domain controller.
To use the NTDS certificate store, import certificates into the Personal certificate store for the NTDS service instead of the Local Computer's Personal store.
If your domain controller can access a Microsoft Enterprise Certificate Authority, you can request a certificate using the built-in Domain Controller certificate template. For more information about certificate templates, see Manage certificate templates. To request and install the certificate, follow these steps:
On the domain controller, press Windows key + R, type certlm.msc, and press Enter.
Expand Personal, right-click Certificates, and select All Tasks > Request New Certificate.
In the Certificate Enrollment wizard, select Next.
Select Active Directory Enrollment Policy, and select Next.
Select the Domain Controller certificate template checkbox.
Select Enroll.
The process automatically installs the certificate in the Local Computer's Personal certificate store. The Domain Controller template comes preconfigured with the correct properties for LDAPS, including:
- Server Authentication enhanced key usage
- The domain controller's FQDN in the Subject Alternative Name
- Automatic renewal before expiration
After the enrollment finishes, restart the domain controller to enable LDAPS.
Verify LDAPS connectivity
After you install the certificate and restart the domain controller, verify that LDAPS connections work correctly.
On the domain controller or a domain-joined client computer, open an elevated command prompt.
Start the Active Directory Administration Tool by running:
ldp.exeIn LDP, select Connection > Connect.
In the Connect dialog:
- Server: Type the name of the domain controller.
- Port: Type 636.
- Select the SSL checkbox.
Select OK.
When the connection succeeds, RootDSE information appears in the right pane, confirming LDAPS is functioning. If the connection fails, verify the certificate properties match the requirements and check that the domain controller was restarted after certificate installation.