?
Solved

Where to find Bind DN info for an AD user account

Posted on 2010-09-08
1
Medium Priority
?
1,227 Views
Last Modified: 2012-05-10
trying to locate the Bind info in AD for these settings (LDAP connection for SPAM service)

 Bind Screen cap
0
Comment
Question by:robertmicp
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 7

Accepted Solution

by:
oztrodamus earned 2000 total points
ID: 33632896
In LDAP terms DN means Distinguished Name. My guess is the top field is refering to the account name you want to use to authenticate the search, followed by the account password. The Base DN would then be the LDAP search string to the root AD folder where your accounts are stored. In other words the domain name. You may or may not have to enter the info in the form of an LDAP string.

Here are some examples that should help you.

http://www.rlmueller.net/LDAP_Binding.htm
0

Featured Post

Prepare for your VMware VCP6-DCV exam.

Josh Coen and Jason Langer have prepared the latest edition of VCP study guide. Both authors have been working in the IT field for more than a decade, and both hold VMware certifications. This 163-page guide covers all 10 of the exam blueprint sections.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
After seeing many questions for JRNL_WRAP_ERROR for replication failure, I thought it would be useful to write this article.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question