ASKER
ASKER
I am looking for a way to avoid Azure.Second part of my comment is not Azure
I would like to use secure ldap and read only DC in the DMZLike published externally? Don't do that
ASKER
ASKER
I have Mimecast for my solution and I use LDAP setup between the my on-prem AD and mimecast.Correct, but their main integration points are ADFS and Azure AD. I will never run LDAP(S) over the Internet.
ASKER
LDAPS is secure by default as long as proper ciphers are negotiated. Even SSL has weak ciphers. But the whole idea is to reduce exposure of your entire AD DS to the Internet.There is a big difference between transport security, protocol security and exposure. With HTTPS you can reverse proxy the HTTPS traffic. With LDAPS you are literally exposing your DCs to the world. No one will ever be able to convince me to use it when technologies such as AD-FS, OAuth, AD Azure etc. exist
ASKER
ASKER
Active Directory (AD) is a Microsoft brand for identity-related capabilities. In the on-premises world, Windows Server AD provides a set of identity capabilities and services, and is hugely popular (88% of Fortune 1000 and 95% of enterprises use AD). This topic includes all things Active Directory including DNS, Group Policy, DFS, troubleshooting, ADFS, and all other topics under the Microsoft AD and identity umbrella.
TRUSTED BY
You can alternatively use an internal site (which you can publish externally with something like WAP) and change authentication method of the site to LDAP similarily to My Free/Open-Source Self-Service Password Reset tool for Active Directory (Look at the web.config)
https://www.experts-exchange.com/articles/31477/Free-Open-Source-Self-Service-Password-Reset-tool-for-Active-Directory.html