Yep - AFAIK, client machines configured to require LDAP signing in Phase 3 will face authentication issues when attempting to authenticate via DC10, which is configured with the LDAP signing policy set to 'None'.
When the "Require Signing" policy is enforced on client machines, they will only perform LDAP operations with servers that support and enforce LDAP signing. This is a client-side requirement that ensures all LDAP traffic is signed and prevents it from communicating with servers that do not support signing.
By keeping LDAP signing set to "None" on DC10, it indicates that this Domain Controller will not enforce or negotiate LDAP signing. Effectively:
- A client requiring LDAP signing will refuse to communicate with a server that does not support it, resulting in a failed connection attempt.
- Clients attempting LDAP operations with DC10 will fail as DC10 cannot negotiate or enforce the required signing.
To avoid these issues: Option 1: Isolate legacy systems further:
- Ensure only legacy systems interact with DC10. Use network segmentation, firewall rules, or host-based policies to restrict access to DC10 solely for those legacy systems that do not support LDAP signing.
Option 2: Add exceptions for legacy systems:
- Implement policies that enforce LDAP signing for all Domain Controllers except DC10. However, ensure that client machines (servers or applications) interacting with DC10 are excluded from the "Require Signing" policy.
If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.
hth
Marcin