Solved

LDAP SSL and Subject Alternate Names

Posted on 2013-12-06
2
817 Views
Last Modified: 2013-12-10
It seems that when using SAN names with the domain controller certificate, only the first name is of importance, all other names are being ignored?
0
Comment
Question by:albatros99
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 12

Accepted Solution

by:
SreRaj earned 500 total points
ID: 39700814
Hi,

Yes, it looks like this is a requirement. Please see the following text from a MS Article.
--------------------------------
Enabling LDAPS for domain controllers using a multi-tier CA hierarchy

•The Subject name or the first name in the Subject Alternative Name (SAN) must match the Fully Qualified Domain Name (FQDN) of the host machine, such as Subject:CN=server1.contoso.com.
--------------------------------

http://social.technet.microsoft.com/wiki/contents/articles/2980.ldap-over-ssl-ldaps-certificate.aspx
0
 
LVL 17

Expert Comment

by:Tony Massa
ID: 39701170
http://support.microsoft.com/kb/931351

You can use an additional SAN, but the first SAN attribute name MUST match the FQDN of the server.  If you wanted to use LDAPS.US.YOURDOMAIN.COM for multiple servers to provide round-robin load balancing of LDAPS, for example, you would use the SAN attribute as:

SAN:server1.yourdomain.com&ldaps.us.yourdomain.com
SAN:server2.yourdomain.com&ldaps.us.yourdomain.com
0

Featured Post

Office 365 Training for IT Pros

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question