Description
This article describes how to configure LDAP over SSL with an example scenario.
The LDAP traffic is secured by SSL.
Scope
Any version of FortiGate.
Solution
In this scenario, a Microsoft Windows Active Directory (AD) server is used as the Certificate Authority (CA). Certificate services have been added as a role and the CA certificate is available for export already.
Prerequisites
Before performing the steps below, install the Active Directory Certificate Services role first as the Certification Authority.
To install Active Directory Certificate Services:
1) Open the Server Manager. In the Server Manager, select Manager -> Add Roles and Features in the top right corner. Select Next until the Server Roles section appears.
2) Select Active Directory Certificate Services and select Add Features:
3) Select Next until the Role Services section appears. Select Certification Authority.
4) Select Next and finish the installation. After the installation has finished, click on Configure Active Directory Certificate Services on the destination server.
5) A new window will pop-up. Select Next and ensure Certification Authority is checked under Role Services then select Next.
6) Select Enterprise CA. If the Enterprise CA cannot be selected, ensure to be logged in as the Administrator in the AD Domain.
7) Continue to select Next until the final screen is reached. The rest of the options can be left on default. Choose to configure them differently according to the requirements.
8) After selecting Configure, the configuration should succeed as such. Select Close when it is done.
Next, follow the steps below to configure LDAPS.
Configure LDAPS on the Microsoft Windows Certificate Authority server:
1) On the Active Directory server, open the MMC (Microsoft Management Console).
Go to File and select Add/Remove Snap-in, then select Certificates and select Add:
Note: From FortiOS v7.2.0 onwards, Administrators can configure a FortiGate client certificate in the LDAP server configuration when the FortiGate connects to an LDAPS server that requires client certificate authentication:
# config user ldap
edit <ldap_server>
set client-cert-auth {enable | disable}
set client-cert <source>
next
end
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2023 Fortinet, Inc. All Rights Reserved.