Solved

LDAP queries from DMZ- What is best practice?

Posted on 2015-01-19
3
881 Views
Last Modified: 2015-01-27
Hello,

Our network is divided into a DMZ and private networks.

We recently had a request to configure a server resting in the DMZ to allow for  LDAP query.

Given that there are security concerns here, what is the best practice to allow such queries?

Thanks,

Mark
0
Comment
Question by:mbudman
3 Comments
 
LVL 53

Accepted Solution

by:
Will Szymkowski earned 250 total points
ID: 40558911
Using Secure LDAP and also having the appropriate firewall rules in place to only allow communication from specific hosts on the private network.

Will.
0
 
LVL 3

Assisted Solution

by:Rezwan Islam
Rezwan Islam earned 250 total points
ID: 40563430
Will has pretty much dot pointed what needs to be done. You will need LDAPS and FW rules set up. I used couple of links below about a year ago to assist on a similar issue.

http://pcloadletter.co.uk/2011/06/27/active-directory-authentication-using-ldaps/
http://www.experts-exchange.com/OS/Microsoft_Operating_Systems/Server/Q_27831833.html
0
 
LVL 1

Author Closing Comment

by:mbudman
ID: 40572772
Thank you for your assistance.

Mark
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Do you know what to look for when considering cloud computing? Should you hire someone or try to do it yourself? I'll be covering these questions and looking at the best options for you and your business.
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question