Configure Microsoft Entra ID to support LDAP

This section describes how to connect Microsoft Entra ID Directory (AD) using LDAP. Before you begin, ensure that you have completed the prerequisites described in  Integrate Microsoft Entra ID with Identity as a Service.

Step 1: Prerequisites

Before you begin, ensure that you have the following:

       A valid Microsoft Entra ID subscription

       A Microsoft Entra ID directory synchronized with an on-premises directory or a cloud-only directory

       Microsoft Entra ID Domain Services enabled (see Microsoft Create and configure a Microsoft Enter Domain Services managed domain)

       A certificate for secure LDAP to the managed domain (see Configure secure LDAP for a Microsoft Entra Domain Services managed domain).

Step 2: Export the secure LDAP certificate.

You need to export the certificate in both .PFX and .CER formats. The .PFX format is used in Microsoft Entra ID and the .CER format is used in Identity as a Service. Use one of the following procedures:

Export the secure LDAP certificate in .PFX format

Export secure LDAP certificate in .CER format

Step 3: Enable secure LDAP for managed domain using Microsoft Entra ID.

1.      Open a Web browser and navigate to the Azure portal at https://portal.azure.com. The Microsoft Azure page appears.

2.      Click Manage Microsoft Entra ID. Sign in to Microsoft Entra ID.

3.      In the Search box of the Microsoft Entra ID page, type domain services. A list of search results appears.

4.      Select Microsoft Entra ID Domain Services from the search results. The Microsoft Entra ID Domain Services page appears.

5.      Click the name of your managed domain to display the domain details.

6.      Click Secure LDAP. The Secure LDAP settings appears.

7.      Click Enable under Secure LDAP. An Allow secure LDAP access over the internet option appears.

8.      Select Enable to allow secure LDAP over the internet.

Caution: Enabling secure LDAP access over the Internet makes your domain susceptible to password brute force attacks. Entrust recommends setting up a Network Security Group (NSG)  to restrict access to only the desired source IP address range. See Lock down LDAPS access to your managed domain over the internet for assistance.

9.      Browse to select the .PFX file with Secure LDAP certificate.

10.  Type the Password to decrypt the .PXF file.

11.  Click Save. A message appears stating that secure LDAP is being configured for the managed domain. You cannot modify the domain settings until you complete this operation.

Note: The operation takes 10-15 minutes to complete. If the provided secure LDAP certificate does not match the required criteria, secure LDAP for the directory is not enabled. A failure message also appears. If this occurs, retry the operation using a valid certificate.

12.  Update the DNS servers as required. See the Microsoft Entra IS documentation.

13.  Restart the Virtual machines in the network to apply the new DNS settings.

14.  Enable password hash synchronization using the instructions provided in the following Microsoft Azure documentation:

        For cloud-only accounts

       For user accounts synchronized from an on-premises directory