Fortinet Document Library

Version:

Version:


Table of Contents

Cookbook

Download PDF
Copy Link

Provision the LDAPS connector in Azure AD DS

To provision the LDAP connector in Azure AD DS:
  1. Login to the Azure admin portal using an Azure admin account.
  2. Select Active Directory Domain Services.
  3. Select View.
  4. Select your AD DS instance, for example fortixpert.com.
  5. Within the AD DS menu for your domain, select Secure LDAP under Settings.
  6. In the Secure LDAP window, perform the following:
    1. Set Secure LDAP to Enable.
    2. Set Allow secure LDAP access over the internet to Enable.
    3. Upload your domain wildcard certificate, for example *.fortixpert.com, in .PFX format.
    4. Enter the password to decrypt the PFX file.
  7. Select the Save button at the top of the page, and wait for Azure to configure Secure LDAP.
    This process takes approximately five minutes.
  8. Once provisioning is complete, you must now allow inbound access for the secure LDAP protocol (port 636 to your AD DS instance.
  9. Browse to the network security group linked in your Secure LDAP connector.
  10. Select the network secure group link to access the network security group settings.
    You can follow the steps found on Microsoft's support website to enable user accounts for Azure AD DS. This is required for users to authenticate through Secure LDAP.
To create an Azure inbound firewall policy:
  1. Within the network security group, go to Settings > Inbound Security Rules, and click Add.
  2. In Add inbound security rule, set the following:
    1. Source: IP Address.
    2. Source IP address/CIDR ranges: Set as the IP address/range that the inbound request will be originating from.
    3. Destination port ranges: 636.
    4. Name: Enter the name, for example AllowSecureLDAP.
    5. Description: Add an optional description.
  3. Leave all other settings as their default values, and click Add.
To obtain the LDAPS IP address:
  1. Go to Azure AD Directory Services, and select the Azure domain.
  2. Go to Settings > Properties. Note down the Secure LDAP external IP address.

Provision the LDAPS connector in Azure AD DS

To provision the LDAP connector in Azure AD DS:
  1. Login to the Azure admin portal using an Azure admin account.
  2. Select Active Directory Domain Services.
  3. Select View.
  4. Select your AD DS instance, for example fortixpert.com.
  5. Within the AD DS menu for your domain, select Secure LDAP under Settings.
  6. In the Secure LDAP window, perform the following:
    1. Set Secure LDAP to Enable.
    2. Set Allow secure LDAP access over the internet to Enable.
    3. Upload your domain wildcard certificate, for example *.fortixpert.com, in .PFX format.
    4. Enter the password to decrypt the PFX file.
  7. Select the Save button at the top of the page, and wait for Azure to configure Secure LDAP.
    This process takes approximately five minutes.
  8. Once provisioning is complete, you must now allow inbound access for the secure LDAP protocol (port 636 to your AD DS instance.
  9. Browse to the network security group linked in your Secure LDAP connector.
  10. Select the network secure group link to access the network security group settings.
    You can follow the steps found on Microsoft's support website to enable user accounts for Azure AD DS. This is required for users to authenticate through Secure LDAP.
To create an Azure inbound firewall policy:
  1. Within the network security group, go to Settings > Inbound Security Rules, and click Add.
  2. In Add inbound security rule, set the following:
    1. Source: IP Address.
    2. Source IP address/CIDR ranges: Set as the IP address/range that the inbound request will be originating from.
    3. Destination port ranges: 636.
    4. Name: Enter the name, for example AllowSecureLDAP.
    5. Description: Add an optional description.
  3. Leave all other settings as their default values, and click Add.
To obtain the LDAPS IP address:
  1. Go to Azure AD Directory Services, and select the Azure domain.
  2. Go to Settings > Properties. Note down the Secure LDAP external IP address.