Note Only LDAP data transfers are exposed. Other authentication or authorization data using Kerberos, SASL, and even NTLM have their own encryption systems. The Microsoft Management Console (mmc) snap-ins, since Windows 2000 SP4 have used LDAP sign and seal or Simple Authentication and Security Layer (SASL) and replication between domain controllers is encrypted using Kerberos.
Warning Before you install a certification authority (CA), you should be aware that you are creating or extending a public key infrastructure (PKI). Be sure to design a PKI that is appropriate for your organization. See PKI Design Brief Overview for additional information.
To request a certificate from your LDAPSL server, do the following on each domain controller that requires LDAPS connections:
Kurt L Hudson edited Revision 1. Comment: Completed the basic version of this article. Plan to enter more step-by-step instructions in the future or create and point out to them.
Kurt L Hudson edited Original. Comment: updated the error message
Kurt L Hudson edited Revision 34. Comment: Updated based on additional feedback from Matthew Rimer
Kurt L Hudson edited Revision 35. Comment: Updated based on additional feedback from Matthew Rimer
Kurt L Hudson edited Revision 36. Comment: Updated formatting
Kurt L Hudson edited Revision 37. Comment: Revised the troubleshooting section based on customer feedback
Kurt L Hudson edited Revision 38. Comment: Modified formatting to be more consistent
Kurt L Hudson edited Revision 39. Comment: Fixed an odd bold formatting issue between two links
Kurt L Hudson edited Revision 40. Comment: Adding certificate to the article title because that is a popular keyword search from customers
Hello, you should add this infor regarding Certificate Storage behavior in 2008 and superior:
Windows Server 2008 improvements
The original recommendation in this article was to put certificates in the Local Machine's Personal store. Although this option is supported, you can also put certificates in the NTDS Service's Personal certificate store on Windows Server 2008 and on later versions of Active Directory Domain Services (AD DS). For more information about how to add the certificate to the NTDS service's Personal certificate store, visit the following Microsoft TechNet Web site:
technet.microsoft.com/.../dd941846(WS.10).aspx
AD DS preferentially looks for certificates in this store over the Local Machine's store. This makes it easier to configure AD DS to use the certificate that you want it to use. This is because there might be multiple certificates in the Local Machines Personal store, and it can be difficult to predict which one is selected.
AD DS detects when a new certificate is dropped into its certificate store and then triggers an SSL certificate update without having to restart AD DS or restart the domain controller.
A new rootDse operation that is named renewServerCertificate can be used to manually trigger AD DS to update its SSL certificates without having to restart AD DS or restart the domain controller. This attribute can be updated using adsiedit.msc, or by importing the change in LDAP Directory Interchange Format (LDIF) using ldifde.exe. For more information on using LDIF to update this attribute, visit the following Microsoft MSDN Web site:
msdn.microsoft.com/.../cc223311(v=PROT.10).aspx
Finally, if a Windows Server 2008 or a later version domain controller finds multiple certificates in its store, it automatically selects the certificate whose expiration date is furthest in the future. Then, if your current certificate is approaching its expiration date, you can drop the replacement certificate in the store, and AD DS automatically switches to use it.
All these work for Windows Server 2008 AD DS and for 2008 Active Directory Lightweight Directory Services (AD LDS). For AD LDS, put certificates into the Personal certificate store for the service that corresponds to the AD LDS instance instead of for the NTDS service. date, you can drop the replacement certificate in the store, and AD DS automatically switches to use it.
FROM: support.microsoft.com/.../en-us
Kurt L Hudson edited Revision 42. Comment: Added a link to how to add subject alternative name to secure LDAP certificate article as this comes up routinely