On March 10th 2020 Microsoft recommends to move to LDAP channel binding and LDAP signing to avoid replay attacks on the LDAP communication. After the hardening changes are done, Simple Authentication and Security Layer (SASL) LDAP binds that do not request signing (integrity verification) will be rejected by Active Directory domain controllers. Cyberoam UTM supports LDAP authentication over SSL/TLS to avoid man-in-the-middle attacks. This article describes the necessary changes to the configuration. The following sections are covered:
Applies to the following Sophos products and versions Cyberoam UTM
To change the connection security for specific Authentication Servers:
IDENTIY | AUTHENTICATION | Authentication Server | Edit
The default port for LDAP is port 389, but LDAPS uses port 636. Connection security has to be changed from Simple to SSL/TLS.
Afterwards the configuration change has to be saved with "OK".
Sign up to the Sophos Support SMS Notification Service to get the latest product release information and critical issues.
Every comment submitted here is read (by a human) but we do not reply to specific technical questions. For technical support post a question to the community. Or click here for new feature/product improvements. Alternatively for paid/licensed products open a support ticket.