Ldap – How to securely join computers in an Active Directory domain in an untrusted network

active-directoryldap

I need to join computers to our Active Directory domain. These computers are on an untrusted network.

How can I force the client computers to use secure protocols (LDAPS instead of LDAP) to join the domain?

Best Answer

I agree with the other posters who say that you need a network layer solution, but I disagree with the advice to use a VPN client. This adds complexity and, if you're looking for the clients on the untrusted network to apply group policy during startup, it's likely not possible with a VPN client.

The domain join (and authentication, in general) would be the least of my concerns when operating clients on an untrusted network. I'd be much more concerned with plaintext traffic to your file servers, application servers, etc. Network layer encryption and authentication is in order, to my mind.

IPSEC is what you're looking for here. Deploying an IPSEC policy on your domain controller computers that requires IPSEC communication to the subnets where the untrusted clients are located (ideally, also applying to your member server computers the clients will be communicating with as well) is the first step.

The second step is to use the AuthIP protocol to join clients to the domain securely. AuthIP allows clients to establish IPSEC connectivity with domain controller during the domain join process. AuthIP is, unfortunately, fairly poorly documented by Microsoft. It's been in the Windows Server and client products since Windows Vista.

Another option might be a DirectAccess VPN (which works "transparently" and doesn't require executing a client program) along with offline Domain Join to bootstrap the clients into the domain and get them using DirectAccess. DirectAccess is IPSEC-based (IPv6 tunneled over an untrusted IPv4 or IPv6 network to your trusted LAN), so you get network layer encryption and authentication using this method, too.