?
Solved

Enable TLS 1.2 Active Directory

Posted on 2016-08-02
2
Medium Priority
?
826 Views
Last Modified: 2016-08-22
Hey,

I'm trying to configure LDAPS communication over port 636 from 3rd party application (Oracle Weblogic 12c) to my Active Directory 2008 R2 Server but I'm facing a bind issue related SSL Handshake not being established because Weblogic 12c is tight to TLS1.2.
So my question goes as follows:

How can I enable TLS1.2 setting on Active Directory

Thanks in advance for your input on the subject.

Regards,
0
Comment
Question by:Hani_SA
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 43

Accepted Solution

by:
Adam Brown earned 2000 total points (awarded by participants)
ID: 41739778
0
 
LVL 43

Expert Comment

by:Adam Brown
ID: 41764170
No response
0

Featured Post

Has Powershell sent you back into the Stone Age?

If managing Active Directory using Windows Powershell® is making you feel like you stepped back in time, you are not alone.  For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Let's recap what we learned from yesterday's Skyport Systems webinar.
Wouldn't it be nice if objects in Active Directory automatically moved into the correct Organizational Units? This is what AutoAD aims to do and as a plus, it automatically creates Sites, Subnets, and Organizational Units.
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

649 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question