Description
This article explains how to set up Microsoft Entra Domain Services with secure LDAP and connect it to FortiGate. Follow the steps to add a custom domain, configure Entra Domain Services, enable secure LDAP, and import certificates. Command line instructions for FortiGate integration are also provided.
Scope
FortiGate.
Solution
Note:
When setting up the custom domain, ensure that the TXT or MX records from Azure are added to the managed domain. As shown in the screenshot below, TXT records have been created in the GoDaddy DNS Management.
It is then possible to create and configure Microsoft Entra Domain Services. Follow this guide for the full setup: Create a Microsoft Entra Domain Services instance
Command Line:
config user ldap
edit "Azure-LDAP"
set server "172.190.141.131" <-- FQDN or IP address of LDAP server.
set server-identity-check disable <-- if IP address is used instead of FQDN, this should be disabled.
set cnid "mail" <-- mail as Common Name Identifier
set dn "dc=pitou,dc=online" <-- Entra managed domain
set type regular
set username "user1@adcorp.site" <-- Entra administrator with LDAP search permissions.
set password <password> <-- Entra administrator credential
set secure ldaps
set ca-cert "azure-ldaps-ca" <-- LDAPS CA Certificate
set port 636
next
end
Note:
FortiOS gives imported Remote CA certificates automatically generated names. To rename the CA certificate, apply the following CLI commands:
config vpn certificate ca
rename CA_Cert_1 to azure-ldaps-ca
end
Notes on certificate trust:
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.