Fortinet white logo
Fortinet white logo

Cookbook

Adding the Azure AD member to AAD DC Administrator group

Adding the Azure AD member to AAD DC Administrator group

After enabling Secure LDAP, you are provided with the external IP address for this service. In the following step, you will edit the network security group to add port 636, to allow external access.

  1. In the Domain Service instance, go to Settings > Properties and click the name of the security group under Network security group associated with subnet.

  2. Go to Settings > Inbound security rules. Find the security rule named Port_636Verify that Action is set to Allow.

  3. Save changes to the network security group.

  4. Go back to Settings > Properties. Select a member and add it to the AAD DC Administrator group, and allow it as the bind DN.

  5. When finished, log out of Microsoft Azure. Log in as the member you just added, and change the member's password.

  6. Note

    This step is necessary in order to make the bind DN work correctly.

Adding the Azure AD member to AAD DC Administrator group

Adding the Azure AD member to AAD DC Administrator group

After enabling Secure LDAP, you are provided with the external IP address for this service. In the following step, you will edit the network security group to add port 636, to allow external access.

  1. In the Domain Service instance, go to Settings > Properties and click the name of the security group under Network security group associated with subnet.

  2. Go to Settings > Inbound security rules. Find the security rule named Port_636Verify that Action is set to Allow.

  3. Save changes to the network security group.

  4. Go back to Settings > Properties. Select a member and add it to the AAD DC Administrator group, and allow it as the bind DN.

  5. When finished, log out of Microsoft Azure. Log in as the member you just added, and change the member's password.

  6. Note

    This step is necessary in order to make the bind DN work correctly.