Support
 
Phone Live Chat
 
Support
 
US: +1 888 720 9500
US: +1 800 443 6694
Intl: +1 925 924 9500
Aus: +1 800 631 268
UK: 0800 028 6590
CN: +86 400 660 8680

Direct Inward Dialing: +1 408 916 9393

 
 
 
 
 
Features

LDAPS, or LDAP over SSL/TLS, is the encrypted version of the Lightweight Directory Access Protocol (LDAP), the standard protocol that applications and services use to query and authenticate against directory services. Where plain LDAP transmits bind credentials and directory data in cleartext over the network, LDAPS wraps that same traffic inside a TLS session, protecting it from interception and tampering the moment the connection is opened.

By default, LDAPS operates on TCP port 636 for standard domain controller (DC) queries and on TCP port 3269 when communicating with the Global Catalog in a multi-domain forest. No application-layer changes are needed to move from LDAP to LDAPS; the difference is entirely at the transport layer, which means that any tool or service that can speak LDAP can be pointed at port 636 once the DC has a valid certificate installed.

For IT administrators managing AD environments, LDAPS is not optional but a baseline security requirement. Microsoft's March 2020 LDAP hardening advisory made this explicit, along with a wide range of compliance frameworks, including PCI DSS, HIPAA, and NIST 800-53, that require encrypted transmission of authentication credentials. ADManager Plus, an AD management and reporting solution that offers user provisioning, delegation, and group management capabilities, uses LDAPS to ensure that every interaction is transmitted over an encrypted channel rather than in plaintext.

What is the difference between LDAP and LDAPS?

The difference between LDAP and LDAPS comes down to a single but consequential distinction: whether or not the traffic between the client and server is encrypted . Both protocols serve the same purpose such as querying, authenticating, and modifying entries in a directory service, but they do it with different security postures which has real consequences for any organization using AD for authentication.

Attribute LDAP LDAPS
Transport Plaintext Encrypted via SSL/TLS
Default port 389 636 for domains and 3269 for Global Catalog
Credentials in transit Visible to any packet capture Encrypted end-to-end
Certificate required on DC No Yes, a valid X.509 certificate is required
TLS handshake None Occurs before any LDAP bind
Suitable for production in AD Only with additional signing or channel binding hardening Yes

Why LDAP is not secure

With LDAP, if you can observe the network segment between an LDAP client and a DC, you can read everything that passes over it, including the bind credentials. Tools can capture and display a cleartext LDAP simple bind in seconds, giving rise to well-documented man-in-the-middle attacks against LDAP without signing or encryption for over two decades.

Microsoft acknowledged this directly when it tightened the defaults in its March 2020 advisory, which began enforcing LDAP signing and channel binding requirements across Windows DCs. But signing alone only provides integrity protection; it does not encrypt credentials in transit, making LDAPS the more complete solution for both confidentiality and integrity. If your security strategy requires that credentials cannot be read on the wire, LDAPS is the only answer.

Before enforcing LDAPS, it is worth auditing your environment to identify which clients and applications are still connecting over LDAP. Windows DCs log unsigned or cleartext LDAP bind attempts as Event ID 2889 in the event log. Enabling diagnostic logging for LDAP Interface Events at Level 2 on each DC will display these events, giving you a list of source IP addresses and account names that are still using insecure binds. Remediating those connections before enforcing LDAPS prevents authentication failures when you move to requiring encrypted channels.

What port does LDAPS use?

LDAPS uses TCP port 636 for standard domain queries and TCP port 3269 for Global Catalog queries in multi-domain AD forests. These port numbers are well-established IANA assignments and have not changed. If you are configuring a firewall rule, application connection string, or network segment ACL, these are the ports you need to open for encrypted LDAP traffic.

Protocol Default port Transport Use case
LDAPS 636 TCP only Encrypted LDAP over SSL/TLS
LDAP (Global Catalog) 3268 TCP Forest-wide directory queries, unencrypted
LDAPS(Global Catalog) 3269 TCP Encrypted forest-wide directory queries

A common point of confusion is whether port 636 uses UDP as well as TCP. Unlike port 389, which supports a connectionless LDAP variant over UDP for certain AD operations like DC discovery, LDAPS is strictly connection-oriented and operates over TCP only. When opening firewall rules for LDAPS, TCP/636 and TCP/3269 are the only ports required and UDP is not required.

How does LDAPS work?

At the protocol level, LDAPS works by wrapping LDAP inside a TLS session, meaning that the very first action that happens when a client connects to port 636 is a TLS handshake, not an LDAP operation. The TLS handshake is the mechanism by which the client and server negotiate the encryption algorithm they will use, exchange keys, and verify the server's identity through its certificate. Only after this handshake is completed and both sides have agreed on an encrypted channel does any LDAP traffic actually flow.

The sequence of events for an LDAPS connection is as follows:

1. The client opens a TCP connection to port 636 on the DC.

2. The server immediately presents its X.509 certificate.

3. The client checks the certificate's validity.

4. A symmetric session key is then derived using the negotiated cipher suite. From this point forward, every LDAP message, including the initial bind that carries the credentials, is encrypted inside that TLS session.

This is different from the STARTTLS mechanism, which is another way of adding TLS to LDAP.

LDAPS vs. STARTTLS

STARTTLS is an extension to the standard LDAP protocol that upgrades an existing connection on port 389 to an encrypted TLS session before any sensitive data is exchanged. Rather than opening a separate encrypted port like LDAPS, STARTTLS begins as a normal LDAP connection and then issues an upgrade command mid-session. Both methods encrypt LDAP traffic in transit, but the way they establish that encryption is fundamentally different. This distinction matters for firewall configuration, application compatibility, and security posture.

LDAPS certificate requirements

LDAPS does not work without a valid X.509 certificate installed on the DC. This certificate requirement is perhaps the most common stumbling block for administrators who are trying to enable LDAPS for the first time. Unlike Kerberos or NTLM, which are identity-layer protocols that AD manages natively, LDAPS depends on the PKI layer and requires either your organization's internal Certificate Authority (CA) or a public CA to supply the certificate that enables the TLS handshake.

If your environment already has an Active Directory Certificate Services (AD CS) deployment with an Enterprise CA, enabling LDAPS is automatic. DCs will auto-enroll for a certificate that satisfies the LDAPS requirements and the process requires no manual intervention. The challenge arises in environments without an internal CA, where administrators must either deploy AD CS, request a certificate from a public CA, or create a self-signed certificate.

Certificate requirements for DCs

For a certificate to enable LDAPS on a DC, it must meet a specific set of criteria that AD LDAP service checks at startup. If the certificate does not meet these requirements, the DC will not listen on port 636, even if the certificate appears installed correctly in the certificate store.

The requirements are:

  • Location: The certificate must be in the Local Computer's Personal (My) certificate store on the DC, not in the Current User store or any other location.
  • Key usage: The certificate must include the Server Authentication OID in its Enhanced Key Usage extension.
  • Subject or SAN: The certificate's Subject Common Name (CN) or a Subject Alternative Name (SAN) DNS entry must match the DC's Fully Qualified Domain Name (FQDN).
  • Private key: The private key associated with the certificate must be present on the DC and must be accessible to the account under which the LDAP service runs.
  • Validity: The certificate must not be expired. LDAPS will silently stop working if the certificate expires without being renewed.
  • Issuer trust: Clients connecting via LDAPS must trust the issuing CA. If you use an internal CA, you need to ensure its root certificate is distributed to client machines via Group Policy or another mechanism.

How to export the LDAPS Certificate

There are situations where you may need to obtain a copy of the LDAPS certificate from a DC. For example, to import it into an application's trust store such as when configuring ADManager Plus to connect via LDAPS, or when a non-Windows LDAP client needs to validate the server certificate. The most straightforward way to do this from the DC itself is through the Certificates MMC snap-in. To do this, you will need to:

  1. Open a Run dialog box and type certlm.msc to open the Local Computer Certificates snap-in.
  2. Navigate to Personal > Certificates and locate the certificate whose Subject or SAN matches the DC's FQDN.
  3. Right-click the certificate and choose All Tasks > Export.
  4. In the Certificate Export Wizard, select the format as DER encoded (.cer) if you just need the public certificate for client trust or PKCS #12 (.pfx) if you also need to export the private key for migration purposes.
  5. For most LDAP client trust scenarios, export as DER (.cer) without the private key, then import that file into the application's trust store or distribute it via Group Policy as a Trusted Root CA.

How to enable LDAPS on a DC

How to verify LDAPS after configuration

Entra Domain Services and LDAPS

Manage the AD you just secured

If you manage AD at scale, securing LDAP traffic is only part of the equation. Provisioning users, delegating permissions, reviewing group memberships, and cleaning up stale accounts still demands significant effort when relying on native tools alone.

ADManager Plus is an AD management and reporting solution that lets IT administrators manage accounts in bulk, manage group memberships, generate over 200 built-in reports, and automate joiner-mover-leaver workflows, all through an intuitive interface that requires no direct access to ADUC or elevated domain privileges.

FAQs

1. What does LDAPS stand for?

LDAPS stands for Lightweight Directory Access Protocol over SSL/TLS. It reflects the fact that it is an LDAP layered over a TLS transport connection rather than a new protocol in its own right.

2. Is LDAP secure by default?

No, LDAP is not secure by default. Without additional configuration, specifically LDAP signing, LDAPS, or STARTTLS, LDAP transmits all traffic including bind credentials in cleartext, making it readable to anyone who can observe the network segment between the client and the directory server. Microsoft's 2020 LDAP hardening update raised the default signing requirements on DCs, but signing alone does not encrypt traffic. Because of this, LDAPS is required for confidentiality.

3. What is the difference between LDAP and LDAPS?

LDAP operates on port 389 and transmits directory queries and authentication data without encryption. LDAPS, on the other hand, operates on port 636 and wraps that same traffic in a TLS session, encrypting all data in transit including credentials. The application-layer protocol is identical, but the difference is entirely at the transport layer.

4. Why does LDAPS matter in cybersecurity?

In a cybersecurity context, LDAPS is significant because directory service authentication is one of the most sensitive attack surfaces in an enterprise network. AD credentials, if captured in transit, give an attacker the ability to escalate privileges, move laterally, and potentially compromise the entire domain. LDAPS addresses this by ensuring that LDAP bind operations and directory query responses cannot be read by anyone who intercepts the network traffic.

5. Does LDAPS require a certificate?

Yes, LDAPS requires a valid X.509 certificate installed in the Local Computer/Personal certificate store on the DC. The certificate must include the Server Authentication OID in its Enhanced Key Usage extension and must have the DC's FQDN in the Subject CN or a SAN DNS entry. Without this certificate, the AD LDAP service will not listen on port 636, and LDAPS connections will fail.

ADManager Plus Trusted By

The one-stop solution to Active Directory Management and Reporting