Educational ICT Virtualisation Specialist

Twitter LinkedIn E-mail
Precedence Technologies Ltd
Technology House, 36a Union Lane
Cambridge, CB4 1QB, United Kingdom
T: +44 (0)8456 446 800 / +44 (0)1223 359900
F: +44 (0)8456 446 899 / +44 (0)1223 359459

Jump To: Support > KB > NetManager > SSL > AD

Enabling LDAPS on Active Directory

  1. Firstly, you must configure your own local certificate authority
  2. Determine the fully qualified domain name of your domain controller(s). This example uses
  3. Create a text file using Notepad on your domain controller. It should contain the following. Note the Subject line needs to be altered to include the full domain name of the domain controller in question:

    Signature="$Windows NT$


    Subject = "" ; Alter this to your FQDN
    KeySpec = 1
    KeyLength = 2048
    ; Can be 1024, 2048, 4096, 8192, or 16384.
    ; Larger key sizes are more secure, but have
    ; a greater impact on performance.
    Exportable = TRUE
    MachineKeySet = TRUE
    SMIME = False
    PrivateKeyArchive = FALSE
    UserProtected = FALSE
    UseExistingKeySet = FALSE
    ProviderName = "Microsoft RSA SChannel Cryptographic Provider"
    ProviderType = 12
    RequestType = PKCS10
    KeyUsage = 0xa0


    OID= ; this is for Server Authentication
  4. Save the file as C:\certreq.inf
  5. At a Windows command prompt, change to the root folder (cd \) and type certreq -certreq.inf request.csr:
  6. Open a web-browser and go to webadmin. Navigate to the Security > Certificates section
  7. Click on the Certificate Authority tab
  8. Click on Download in the Certificate: section to download the CA cert (filename will be ca.crt)
  9. In the Sign Certificate section, click Browse (or Choose File depending on your browser) and locate C:\request.csr. Click on Issue certificate from CSR
  10. The certificate will be issued and visible in the Issued certs section:
  11. Click on its name to download the certificate to C:\. The filename will be based on the certificate subject, to make it easier to import you may change its name if you wish.
  12. To make Windows trust certificate from your local CA, go to a Windows command prompt and type certutil -addstore "Root" C:\ca.crt:
  13. You may then import your signed certificate with certreq -accept <certificate file name>. N.B. You must do this after adding the CA cert to the trust store or this step will fail:@@
  14. Reboot your domain controller for the change to take effect
  15. To test LDAPS, run the ldp command on the domain controller
  16. Pick Connect... from the Connection menu
  17. Enter the fully-qualified name of your domain controller, enter 636 as the port number and tick the SSL box. Click OK:
  18. If you don't get a Cannot open connection error, then LDAPS is working.
  19. You can test further by picking Bind... from the Connection menu and logging as the current user:
© Copyright Precedence Technologies 1999-2019
Page last modified on November 06, 2017, at 05:36 PM by sborrill