LDAP signing set to 'Require Signing' on Endpoints (including Servers) & none on Domain Controllers

HM 66 Reputation points
2024-12-09T22:36:30.5+00:00

Background Information:

We are in the process of enabling LDAP signing within our domain.

  • Phase 1: We updated the Group Policy on client machines to 'Negotiate Signing' and enabled auditing on Domain Controllers. The 2889 event ID in Directory Services identified few legacy appliances and applications that cannot support LDAP signing.

To address this, we decided to redirect such legacy systems to a specific Domain Controller (e.g., DC10). Currently, the LDAP signing policy on all Domain Controllers is set to 'None.'

Phase 2: We plan to enable LDAP signing as 'Require Signing' on all Domain Controllers except DC10.

Phase 3: We intend to enforce LDAP signing as 'Require Signing' on all client machines (including servers).

Question:

Given that we will not enable the LDAP signing group policy on DC10 (keeping it set to 'None'), will client machines configured to require LDAP signing face any authentication issues when attempting to authenticate via DC10 after Phase 3? Or will it still function correctly, even though DC10 does not mandate LDAP signing?

Windows for business | Windows Client for IT Pros | Directory services | Active Directory
0 comments No comments
{count} votes

Accepted answer
  1. Marcin Policht 50,335 Reputation points MVP Volunteer Moderator
    2024-12-10T00:12:12.08+00:00

    Yep - AFAIK, client machines configured to require LDAP signing in Phase 3 will face authentication issues when attempting to authenticate via DC10, which is configured with the LDAP signing policy set to 'None'.

    When the "Require Signing" policy is enforced on client machines, they will only perform LDAP operations with servers that support and enforce LDAP signing. This is a client-side requirement that ensures all LDAP traffic is signed and prevents it from communicating with servers that do not support signing.

    By keeping LDAP signing set to "None" on DC10, it indicates that this Domain Controller will not enforce or negotiate LDAP signing. Effectively:

    • A client requiring LDAP signing will refuse to communicate with a server that does not support it, resulting in a failed connection attempt.
    • Clients attempting LDAP operations with DC10 will fail as DC10 cannot negotiate or enforce the required signing.

    To avoid these issues: Option 1: Isolate legacy systems further:

    • Ensure only legacy systems interact with DC10. Use network segmentation, firewall rules, or host-based policies to restrict access to DC10 solely for those legacy systems that do not support LDAP signing.

    Option 2: Add exceptions for legacy systems:

    • Implement policies that enforce LDAP signing for all Domain Controllers except DC10. However, ensure that client machines (servers or applications) interacting with DC10 are excluded from the "Require Signing" policy.

    If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.

    hth

    Marcin


0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.