LDAPS setup failing with a general error

Dimitar Peev 1 Reputation point
2019-11-20T10:59:08.597+00:00

Hey everyone,

Trying to setup Azure AD DS LDAPS using this article with a self-signed certificate.
I have tried different password and export encryption for the PFX file and I am getting the error "Failed to configure secure LDAP for domain.com. Please check Activity log for more detail."

However, there is 0 information about the error in the Activity Logs.
I even enabled an additional log collection and there are simply no logs of this activity at all.

Any tips? Is password hash sync a prerequisite for LDAPS? I would prefer not to sync on-prem pass hashes and only use one cloud-only account (whose password should already be synced) to serve data to another service.

Any tips appreciated.

Microsoft Entra
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Erin Greenlee 26 Reputation points Microsoft Employee
    2019-11-21T01:27:07.49+00:00

    Noted about the activity log details -- that is misleading and we should fix that :)

    For the cert upload problem, it's hard to say what is going wrong without knowing more specifically about your certificate and domain name. I suggest opening up a support case for assistance with that.

    For your second question -- short answer is yes and no, hehe. If you expect any on-prem user to use LDAPs in any way, you need password hash sync. Since you are using only cloud users for LDAP turning on password hash sync will not be necessary, but I would say that your scenario is pretty unique. For you I would also recommend configuring scoped-sync to sync only that user into AAD-DS to avoid syncing unnecessary objects into AAD-DS.

    However, if you are already syncing on-prem passwords into AAD using AAD Connect, when you turn on AAD-DS the password hashes we use for AAD-DS WILL sync to AAD. This goes for all passwords being synced regardless of whether or not the user is synced to AAD-DS. If you do not already sync passwords then you do not need to do so if you plan to use only your cloud account.

    Erin Greenlee
    Program Manager
    Azure AD Domain Services

    1 person found this answer helpful.