This affects all of us who still use plain LDAP to perform queries in Active Directory. Starting in March we will be forced to use secure LDAP binding, because AD will deny plain LDAP connections. This may have a significant impact on those NetEye and EriZone Systems that use LDAP as an authentication or sync source.
As a definitive solution, you need to switch to LDAPS, which is supported by all versions of NetEye and by EriZone.
Please consult your product’s user guide, or contact our support service to obtain more specific help about this matter.
I graduated in Applied Computer Science at the University of Bolzano in 2006. After 3 years of experience as consultant in a small IT business IT I decided to move on, and found Würth Phoenix as a good starting point for a career.
After serving several years as a developer, consultant and support engineer, I now lead the Service & Support Team and aim to deliver best quality services to our customers, by helping them using our products together with the strength of Open Source, in which I strongly believe.
Author
Oreste Attanasio
I graduated in Applied Computer Science at the University of Bolzano in 2006. After 3 years of experience as consultant in a small IT business IT I decided to move on, and found Würth Phoenix as a good starting point for a career.
After serving several years as a developer, consultant and support engineer, I now lead the Service & Support Team and aim to deliver best quality services to our customers, by helping them using our products together with the strength of Open Source, in which I strongly believe.
At SharpCoding 2025 in Rome—hosted at Microsoft’s headquarters—I had the pleasure of sharing our approach to simplifying deployments using Azure Container App Jobs. In my session, "Guided Deployments: Power Platform under Control with Azure DevOps," I discussed how we tackled Read More
In some test or development environments, there may be a need to simulate the presence of GSM modems without having physical devices. This can be useful, for example, to test monitoring checks, SMS management systems, or to create new notification Read More
Just like last year, we had the wonderful opportunity to attend FOSDEM, the most important open source conference in Europe. This year was no exception, and among the many exciting talks, one that particularly caught my attention was Alex Stefanini’s Read More
When designing an Elasticsearch architecture, choosing the right storage is crucial. While NFS might seem like a convenient and flexible option, it comes with several pitfalls when used for hosting live Elasticsearch data (hot, warm, cold, and frozen nodes). However, Read More
When using Kibana in environments that require a proxy to reach external services, you might encounter issues with unrecognized SSL certificates. Specifically, if the proxy is exposed with its own certificate and acts as an SSL terminator, requests made by Read More