Enabling LDAP over SSL with Self-Signed certificate
To enable the test client to talk to the remote Active Directory Domain Services via this provider, using a secure LDAP connection, we can use a self-signed certificate.
- Log in to the remote DC
- Open PowerShell in elevated mode and run the following code:
Replace the DnsName to your server's FQDN nameCopy
$name = "remote.domain"
$cert = New-SelfSignedCertificate -DnsName $name -CertStoreLocation Cert:\LocalMachine\My
$path = "HKLM:\Software\Microsoft\Cryptography\Services\NTDS\SystemCertificates\My\Certificates"
if(!(Test-Path $path)) { New-Item -Force $path }
Copy-Item -Path "HKLM:\Software\Microsoft\SystemCertificates\My\Certificates\$($cert.Thumbprint)" -Destination $path
The created certificate will be immediately used by the AD DS. There is no need to reboot the machine.
Testing the LDAP connection
To test the LDAP connections, use a tool like LDP. Ensure secure communication is established and accounts are accessible.
- Start LDP
- Click Start
- Click Run, then type ldp and then click OK. You should see a message at the top saying : "Established connection to xxx.xxx.xxx".
SPS Test Client
You can find the Test Client in the SPS Admin Tool installation directory, i.e.
C:\Program Files\Specopssoft\Specops Password Sync\Admin Tools\PasswordSync.ProviderTestApp.exe
- Select Active Directory Ldap from the list of Sync Providers
- Configure the Sync Provider