The defines whether
the ldap server requires ldap traffic to be signed or signed and encrypted (sealed).
Possible values are no,
allow_sasl_without_tls_channel_bindings
and yes.
Windows has LdapEnforceChannelBinding under
HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Parameters\.
A value of no allows simple and sasl binds over
all transports. This matches LdapEnforceChannelBinding=0.
A value of allow_sasl_without_tls_channel_bindings
allows simple and sasl binds (without sign or seal) over TLS encrypted connections.
Missing tls channel bindings are ignored, so only use this if a value of
yes is not possible.
Unencrypted connections only allow sasl binds with sign or seal.
This matches LdapEnforceChannelBinding=1.
Before support for tls channel bindings existed in Samba,
a value of allow_sasl_over_tls was possible in order
to allow sasl binds without tls channel bindings. This is now misleading
as a value of yes will now allow sasl binds
with tls channel bindings. Configurations should be changed to
yes instead or
allow_sasl_without_tls_channel_bindings
if really required. Currently allow_sasl_over_tls
is just an alias of allow_sasl_without_tls_channel_bindings,
but it will be removed in future versions.
A value of yes allows only simple binds
and sasl binds with correct tls channel bindings
over TLS encrypted connections. sasl binds without tls channel bindings
are not allowed. Unencrypted connections only
allow sasl binds with sign or seal. This matches LdapEnforceChannelBinding=2.
yes