Anonymous LDAP operations to Active Directory are disabled on Windows Server 2003 domain controllers
With Windows Server 2003, only authenticated users may initiate an LDAP request against Windows Server 2003-based domain controllers. You can override this new default behavior by changing the seventh character of the dsHeuristics attribute on the DN path as follows:
Valid values for the dsHeuristic attribute are 0 and 0000002. By default, the DsHeuristics attribute does not exist, but its internal default is 0. If you set the seventh character to 2 (0000002), anonymous clients can perform any operation that is permitted by the access control list (ACL), as can Windows 2000-based domain controllers.
Note If the attribute is already set, do not modify any characters in the DsHeuristics string other than the seventh character. If the value is not set, make sure that you provide the leading zeros up to the seventh character. Also, you can use Adsiedit.msc to make the change to the attribute.
The dsHeuristics string on a domain controller in the Forest_Name.com forest appears as follows when you view it by using Ldp.exe. Only selected attributes are shown.
>> Dn: CN=Directory Service,CN=Windows NT,CN=Services,CN=Configuration,DC=<forest_name>,DC=com 2> objectClass: top; nTDSService; 1> cn: Directory Service; 1> dSHeuristics: 0000002; <-2 in the seventh character = anonymous access allowed. Note the leading zeros. 1> name: Directory Service;
Artikelnummer: 326690 – Letzte Überarbeitung: 12/03/2007 04:38:36 – Revision: 13.3
- kbenv kbinfo KB326690