Solved

LDAP queries from DMZ- What is best practice?

Posted on 2015-01-19
3
930 Views
Last Modified: 2015-01-27
Hello,

Our network is divided into a DMZ and private networks.

We recently had a request to configure a server resting in the DMZ to allow for  LDAP query.

Given that there are security concerns here, what is the best practice to allow such queries?

Thanks,

Mark
0
Comment
Question by:mbudman
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 53

Accepted Solution

by:
Will Szymkowski earned 250 total points
ID: 40558911
Using Secure LDAP and also having the appropriate firewall rules in place to only allow communication from specific hosts on the private network.

Will.
0
 
LVL 3

Assisted Solution

by:Rezwan Islam
Rezwan Islam earned 250 total points
ID: 40563430
Will has pretty much dot pointed what needs to be done. You will need LDAPS and FW rules set up. I used couple of links below about a year ago to assist on a similar issue.

http://pcloadletter.co.uk/2011/06/27/active-directory-authentication-using-ldaps/
http://www.experts-exchange.com/OS/Microsoft_Operating_Systems/Server/Q_27831833.html
0
 
LVL 1

Author Closing Comment

by:mbudman
ID: 40572772
Thank you for your assistance.

Mark
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question