Securing LDAP with a Self Signed Certificate

preview_player
Показать описание
Video going through securing Microsoft Active Directory with a self signed certificate
Рекомендации по теме
Комментарии
Автор

Thank you so much Daniel, this is very helpful.

miriyala
Автор

Very Good, Clear, Crisp and to the point I would say the best Video on Youtube if someone wants to enable LDAPS .... Keep up the good work :-)

npanthri
Автор

This was exactly what i was looking for. You did a wonderful job. Step by step with explanations. I Subscribed.
I especially liked that you did not assume knowledge of even simple things like ipconfig.
Thank you for taking the time to do this.

jameslewis
Автор

You should never install CA on domain controller in the production.

binaryblog
Автор

Thanks a lot! You helped me to give a great solution for my customer!

Romelinojapao
Автор

Great video! One thing that's been puzzling me is that if the certificate auto-renews every 5 years, wouldn't that break all LDAPS clients? I've been doing LDAPS upgrades recently and in some cases I can use the CA certificate, and in other cases I'm stuck using the client-certificate which expires more frequently. Your video helped me remember how I set this up. Thanks!

EricCosner
Автор

Very Useful but shouldn't the Hash Algorithm be at least SHA256 these days?

kkronfli
Автор

Good informative video. Quick question, if you have multiple domain controllers do you generate the certificate on the main domain controller. And then add that certificate into the Trusted Root CA of all the other domain controllers?

mashk
Автор

you've 3 servers: 192.168.130.[128-130] - The DC (LDAP server at .129) which you add ADCS Role & feature. It becomes the CA. What are .128 and .130?

matthewdo