How to setup the Microsoft Entra Domain Services in Azure along with enabling LDAP so that users can login from LDAP enabled applications and can be authenticated using Azure ?

Neelesh Srivastava 0 Reputation points
2025-05-14T06:38:52.2233333+00:00

I am trying to setup the Microsoft Entra Domain Services. So that users can be authenticated from LDAP to use any third party service like git, etc. Below are the steps I followed:

  1. Created the private virtual net
  2. Created the Entra Domain Services in that domain
  3. Created VM (Please let me know if it is not necessary for my requirement)

But I am unable to accomplish the above requirement.

Microsoft Security | Microsoft Entra | Microsoft Entra ID
{count} votes

1 answer

Sort by: Most helpful
  1. Sakshi Devkante 4,400 Reputation points Microsoft External Staff Moderator
    2025-05-14T16:24:35.14+00:00

    Hello Neelesh Srivastava

    Setting up Microsoft Entra Domain Services to allow LDAP authentication for third-party applications (like Git, Jenkins, etc.) is possible.

    1.Microsoft Entra Domain Services provides LDAP, Kerberos, and NTLM protocols by replicating Entra ID users into a managed domain. You cannot directly use Entra ID for LDAP only AADS supports LDAP. Users must be Entra ID users and either: Cloud-only users, or Synced via Entra Connect from on-prem AD.

    2.Entra Domain Services must be deployed to a VNet, as it operates within a subnet in that VNet. ensure DNS is properly configured to use the AADS domain controllers (DNS settings in the VNet must point to the AADS IP addresses)

    3.As you mentioned ADDS has already been deployed AADS domain controllers are provisioned in the subnet, DNS for the VNet is automatically updated with AADS IP addresses, or manually set to those IPs

    4.By default, LDAP is only available within the VNet and not encrypted.

    To allow external apps to authenticate over LDAP, you must enable Secure LDAP (LDAPS).

    Steps:

    Go to your Microsoft Entra Domain Services resource

    Under Settings → Secure LDAP, enable it.

    Provide a public certificate (e.g., from DigiCert, Let's Encrypt) or create one via Azure Key Vault.

    Enable Allow secure LDAP access over the internet (if your app is outside the VNet).

    Save the configuration. [Microsoft recommends using LDAPS only (not plain LDAP), as plain LDAP is not secure]

    Port 636 must be open in the network security group (NSG) for this to function.

    5.Users must have password hashes available to support LDAP/Kerberos.

    For cloud-only users, this means: Users must reset their password after AADS is provisioned

    For hybrid environments: Entra Connect must have password hash sync enabled

    6.While a VM is not required for LDAP to function, it can help with testing (e.g., using ldp.exe or ldapsearch).

    Applications connecting via LDAP must-- Be in the same VNet, or Have DNS configured to resolve the AADS domain, or Connect externally using Secure LDAP (if enabled).

    Refer documents:
    What is Microsoft Entra Domain Services?
    Configure secure LDAP for a Microsoft Entra Domain Services managed domain
    LDAP synchronization with Microsoft Entra ID
    LDAP authentication with Microsoft Entra ID
    Secure LDAP alerts in Microsoft Entra Domain Services

    I hope this clarifies things.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.