Secure LDAP for external access for a third party vendor
Posted on 2014-08-19
WE have a SBS 2011 server with a current SSL certificate. We have a third party vendor that needs to be able extract AD info via LDAP. We want to use LDAPS to help secure it. We have blocked port 636 except for the vendors IP range, and we know its talking as we can telnet to this port. When trying to connect via the FQDN of the current SSL certificate issued by a third party CA, it doesn't connect. I have tried adding a new FQDN ie trend.XXX.com.au pointing to the external IP address and created a SSL certificate from the local CA, and even a third party CA, but it still doesn't connect. Its like its not liking the certificate name it finds. When using LDP.exe as a test to connect to trend.xxx.com.au, the system event talks about schannel and mentions: "The certificate received from the remote server was issued by an untrusted certificate authority. Because of this, none of the data contained in the certificate can be validated. The SSL connection request has failed. The attached data contains the server certificate" When i look at the friendly view, I can see mention of the internal name of the server.