Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Secure Active Directory authentication with public CA and no AD CS

Hi All,

For secure AD authentication it seems Sophos advice is to install AD CS and create an AD CA on every AD server you use.

Link: https://community.sophos.com/sophos-xg-firewall/f/recommended-reads/128222/sophos-firewall-how-to-integrate-active-directory-with-ssl-tls-or-starttls-connection-security

Sophos support confirmed this is the way to go. For me this seems like overkill. IBM even states on there website not to do this; "Do not install the Certificate Services role on the Active Directory server. Some Active Directory Domain configurations are not suited to accept an installed Certificate Services role. For example, when there are multiple Active Directory servers in a domain." Link: https://www.ibm.com/docs/en/tsm/7.1.1?topic=passwords-configuring-windows-active-directory-tlsssl 

Just to check with the community, why not use a public CA certificate? Then there is no need to install AD CS on every AD.

Link: https://docs.microsoft.com/en-us/troubleshoot/windows-server/identity/enable-ldap-over-ssl-3rd-certification-authority 

Did anybody already tried this? And please share your thoughts on this.



This thread was automatically locked due to age.