Skip to main content

Check out Interactive Visual Stories to gain hands-on experience with the SSE product features. Click here.

Skyhigh Security

Enable LDAPS Support on Azure Active Directory


  1. Enable password hash synchronization for cloud-only users and/or on-prem user accounts. 
  2. Obtain a customer secure LDAP certificate in CRT or PEM format. You will need this information to Configure Cloud Connector to use LDAPS. Use one of the options in the following section. 

Obtain a Certificate for Secure LDAP

Option A (Recommended) - Obtain a Certificate from a Certification Authority

Obtain a secure LDAP certificate from a certification authority with the following requirements.

  • Trusted issuer. The certificate must be issued by an authority trusted by computers connecting to the managed domain using secure LDAP. This authority may be a public certification authority (CA) or an Enterprise CA trusted by these computers.
  • Lifetime. The certificate must be valid for at least the next 3-6 months. Secure LDAP access to your managed domain is disrupted when the certificate expires.
  • Subject name. The subject name on the certificate must be a wildcard for your managed domain. For instance, if your domain is named, the certificate's subject name must be * Set the DNS name (subject alternate name) to this wildcard name.
  • Key usage. The certificate must be configured for the following uses: digital signatures and key encipherment.
  • Certificate purpose. The certificate must be valid for SSL server authentication.

Option B - Create a Self-Signed Certificate

To create a self-signed certificate for LDAP:

  1. Open a new PowerShell window as Administrator and enter the following commands:

New-SelfSignedCertificate -Subject `
  -NotAfter $lifetime.AddDays(365) -KeyUsage DigitalSignature, KeyEncipherment `
  -Type SSLServerAuthentication -DnsName *

  1. In the preceding sample, replace with the DNS domain name of your managed domain. For example, if you created a managed domain called
    • In the Subject attribute, replace  with
    • In the DnsName attribute, replace with

Export the Secure LDAP Certificate

  1. To open the Windows MMC snap-in, navigate to Start > Run > mmc.
  2. From the File menu, click Add/Remove Snap-in...
  3. In the Add or Remove Snap-ins dialog, select the Certificates snap-in, and click Add.
  4. In the Certificates Snap-in wizard, select Computer account and click Next.
  5. On the Select Computer page, select Local computer (the computer this console is running on) and click Finish.
  6. In the Add or Remove Snap-ins dialog, click OK to add the certificates snap-in to MMC.
  7. In the MMC window, click to expand Console Root. You should see the Certificates snap-in loaded. Click Certificates (Local Computer) to expand. Click to expand the Personal node, followed by the Certificates node.
  8. You should see the self-signed certificate you created. You can examine the properties of the certificate to verify that the thumbprint matches the one reported on the PowerShell windows when you created the certificate.
  9. Select the self-signed certificate and right-click. From the right-click menu, select All Tasks and select Export...
  10. In the Certificate Export Wizard, click Next.
  11. On the Export Private Key page, select Yes, export the private key, and click Next.
  12. On the Export File Format page, select Personal Information Exchange - PKCS #12 (.PFX) as the file format for the exported certificate.
  13. Repeat steps 7–10, select No, do not export the private key, and this certificate will be sent to Skyhigh CASB for the Cloud Connector.
  14. On the Security page, select the Password option and enter a password to protect the PFX file. Remember this password, as you will need it in the next task. Click Next.
  15. On the File to Export page, specify the file name and location where you'd like to export the certificate.
  16. On the following page, click Finish to export the certificate to a PFX file. You will see a confirmation dialog when the certificate has been exported.

Enable LDAPS for an Azure AD Domain Services Managed Domain

  1. Navigate to the Azure portal.
  2. In the Search resources search box, search for domain services.
  3. Select Azure AD Domain Services from the search result. The Azure AD Domain Services page lists your managed domain.
  4. Click the name of the managed domain (for example, to see more details about the domain.
  5. On the navigation pane, click Secure LDAP.
  6. Toggle Secure LDAP to Enable. By default, secure LDAP access to your managed domain is disabled. It can take up to 15 minutes to enable LDAPS for the domain.
  7. Toggle Allow secure LDAP access over the internet to Enable


  • Was this article helpful?