Event ID 1220 — LDAP over SSL (LDAPS)
Applies to
Windows Server 2003, Windows Server 2003 R2, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012
Overview
The TechNet Library version of this article is published as LDAP over SSL (LDAPS)
Lightweight Directory Access Protocol (LDAP) communications between client computers and server computers can be encrypted with LDAP over Secure Sockets Layer (SSL) connections. You can configure Active Directory Domain Services (AD DS) and Active Directory Lightweight Directory Services (AD LDS) to support LDAP over SSL.
Event Details
Product: | Windows Operating System |
ID: | 1220 |
Source: | Microsoft-Windows-ActiveDirectory_DomainService |
Version: | 6.0 |
Symbolic Name: | DIRLOG_LDAP_SSL_NO_CERT |
Message: | LDAP over Secure Sockets Layer (SSL) will be unavailable at this time because the server was unable to obtain a certificate. |
Resolution
Configure LDAP over SSL
Event ID 1220 is logged on a domain controller when client computers attempt to make an LDAP-over-SSL connection to the directory when SSL connections are not enabled on the directory. If you want to configure a domain controller or an AD LDS server to support SSL connections, you must provide a certificate for the AD DS or AD LDS directory to use. If you do not want to support LDAP over SSL connections on the directory, identify the client computers that are attempting to make such connections so that you can resolve this issue.
Membership in Domain Admins, or equivalent, is the minimum required to complete this procedure. Perform the following procedure on a domain controller or a computer that has RSAT installed. See Installing Remote Server Administration Tools for AD DS (http://go.microsoft.com/fwlink/?LinkId=144909).
If you want to configure your domain controllers to support SSL connections, you can install and configure the Active Directory Certificate Services (AD CS) role on a domain controller or you can import a certificate from a trusted certification authority (CA).
If you install the AD CS role and specify the Setup Type as Enterprise on a domain controller, all domain controllers in the forest will be configured automatically to accept LDAP over SSL.
Warning: In most cases, you should not install a CA on a domain controller! For more information, see PKI Design Brief Overview.
If you prefer to use a certificate from a CA that is not installed on a domain controller, you must import a certificate with an intended purpose of server authentication from a trusted CA into the AD DS personal store.
To import a certificate into the AD DS personal store:
- Open a command prompt as an administrator. To open a command prompt as an administrator, click Start. In Start Search, type Command Prompt. At the top of the Start menu, right-click Command Prompt, and then click Run as administrator. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue.
- To open Microsoft Management Console (MMC), type mmc, and then press ENTER.
- Click File, click Add/Remove Snap-in, select Certificates from the available snap-ins, and then click Add.
- In Add or Remove Snap-ins, click Service account to view the certificates that are stored in the service's personal store, and then click Next.
- In Add or Remove Snap-ins, click Local computer, and then click Next.
- In Add or Remove Snap-ins, click Active Directory Domain Services, click Finish, and then click OK.
- In the console tree, expand Certificates - Service (Active Directory Domain Services), expand Personal, and then expand Certificates.
- To import a certificate, right-click the NTDS\Personal folder, click All Tasks, and then click Import. When the certificate is imported, client computers should be able to make SSL connections to all domain controllers in the forest.
If you need to configure AD LDS to support LDAP over SSL connections, follow the instructions in Appendix A: Configuring LDAP over SSL Requirements for AD LDS (http://go.microsoft.com/?linkid=9645086).
Additional information
- Article 321051 in the Microsoft Knowledge Base (http://go.microsoft.com/fwlink/?LinkID=15129)
- Certificates How To (http://go.microsoft.com/fwlink/?LinkId=99765).
- Certificate Services (http://go.microsoft.com/fwlink/?LinkID=48952).
Verify
Membership in Domain Users, or equivalent, is the minimum required to complete this procedure. Review details about default group memberships at http://go.microsoft.com/fwlink/?LinkID=150761. Perform the following procedure on a domain controller or a computer that has Remote Server Administration Tools (RSAT) installed. For more information about RSAT, see Installing Remote Server Administration Tools for AD DS (http://go.microsoft.com/fwlink/?LinkId=144909).
To confirm that LDAP over SSL is configured successfully:
- Open the Ldp snap-in. To open Ldp, click Start. In Start Search, type ldp. Right-click the Ldp icon on the Start menu, and then click Run as administrator. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue.
- Click the Ldp Connection menu, and then click Connect. In Server, type the host name of the server to which you want to connect. Ensure that Port is set to 636, the Connectionless check box is cleared, and the SSL check box is selected, and then click OK. If you receive a message that says “Cannot open connection,” LDAP-over-SSL binding is not configured properly.
- Click the Connection menu, click Bind, and then click OK.
- The command output should display the user name and domain name that you used for binding, if LDAP over SSL is configured properly.
Related Management Information
Enable LDAP over SSL (LDAPS) on Windows 2008 Active Directory Domain : http://www.christowles.com/2010/11/enable-ldap-over-ssl-ldaps-on-windows.html
Troubleshooting LDAP over SSL (LDAPS): http://blogs.technet.com/b/askds/archive/2008/03/13/troubleshooting-ldap-over-ssl.aspx
WebSphere to Active Directory over SSL: http://publib.boulder.ibm.com/infocenter/wpdoc/v510/index.jsp?topic=/com.ibm.wp.ent.doc/wpf/cfg_ldap_ssl.html