Skip to content

Latest commit

 

History

History
93 lines (67 loc) · 5.54 KB

active-directory-ds-admin-guide-configure-secure-ldap-export-pfx.md

File metadata and controls

93 lines (67 loc) · 5.54 KB
title description services documentationcenter author manager editor ms.assetid ms.service ms.workload ms.tgt_pltfrm ms.devlang ms.topic ms.date ms.author
Configure Secure LDAP (LDAPS) in Azure AD Domain Services | Microsoft Docs
Configure Secure LDAP (LDAPS) for an Azure AD Domain Services managed domain
active-directory-ds
mahesh-unnikrishnan
stevenpo
curtand
c6da94b6-4328-4230-801a-4b646055d4d7
active-directory-ds
identity
na
na
article
06/30/2017
maheshu

Configure secure LDAP (LDAPS) for an Azure AD Domain Services managed domain

Before you begin

Ensure you've completed Task 1 - obtain a certificate for secure LDAP.

Task 2 - export the secure LDAP certificate to a .PFX file

Before you start this task, ensure that you have obtained the secure LDAP certificate from a public certification authority or have created a self-signed certificate.

Perform the following steps, to export the LDAPS certificate to a .PFX file.

  1. Press the Start button and type R. In the Run dialog, type mmc and click OK.

    Launch the MMC console

  2. On the User Account Control prompt, click YES to launch MMC (Microsoft Management Console) as administrator.

  3. From the File menu, click Add/Remove Snap-in....

    Add snap-in to MMC console

  4. In the Add or Remove Snap-ins dialog, select the Certificates snap-in, and click the Add > button.

    Add certificates snap-in to MMC console

  5. In the Certificates snap-in wizard, select Computer account and click Next.

    Add certificates snap-in for computer account

  6. On the Select Computer page, select Local computer: (the computer this console is running on) and click Finish.

    Add certificates snap-in - select computer

  7. In the Add or Remove Snap-ins dialog, click OK to add the certificates snap-in to MMC.

    Add certificates snap-in to MMC - done

  8. In the MMC window, click to expand Console Root. You should see the Certificates snap-in loaded. Click Certificates (Local Computer) to expand. Click to expand the Personal node, followed by the Certificates node.

    Open personal certificates store

  9. You should see the self-signed certificate we created. You can examine the properties of the certificate to ensure the thumbprint matches that reported on the PowerShell windows when you created the certificate.

  10. Select the self-signed certificate and right click. From the right-click menu, select All Tasks and select Export....

    Export certificate

  11. In the Certificate Export Wizard, click Next.

    Export certificate wizard

  12. On the Export Private Key page, select Yes, export the private key, and click Next.

    Export certificate private key

    [!WARNING] You MUST export the private key along with the certificate. If you provide a PFX that does not contain the private key for the certificate, enabling secure LDAP for your managed domain fails.

  13. On the Export File Format page, select Personal Information Exchange - PKCS #12 (.PFX) as the file format for the exported certificate.

    Export certificate file format

    [!NOTE] Only the .PFX file format is supported. Do not export the certificate to the .CER file format.

  14. On the Security page, select the Password option and type in a password to protect the .PFX file. Remember this password since it will be needed in the next task. Click Next to proceed.

    Password for certificate export

    [!NOTE] Make a note of this password. You need it while enabling secure LDAP for this managed domain in Task 3 - enable secure LDAP for the managed domain

  15. On the File to Export page, specify the file name and location where you'd like to export the certificate.

    Path for certificate export

  16. On the following page, click Finish to export the certificate to a PFX file. You should see confirmation dialog when the certificate has been exported.

    Export certificate done

Next step

Task 3 - enable secure LDAP for the managed domain