Perform a SASL (Negotiate Kerberos NTLM Digest) LDAP . - PierreGode/Linux-Active-Directory-join-script GitHub Wiki
Microsoft LDAP Channel Binding and LDAP Signing Requirements - March update NEW behaviour!
By defaul the script uses tls but with the new requrements certificate signing is needed.
Microsoft will change ldap to ldaps and this can be solved with adding Simple Authentication and Security Layer SASL
for configuration on clients you need to add 2 rows to sssd.conf
ldap_uri = ldaps://yourDC.com:636
ldap_tls_cacert = /usr/share/ca-certificates/root/CA-ROOT-SHA256-current.cer (company CA-certificate)
and reload sssd with sudo service sssd restart.
The ADconnection script has this supported, and will ask for domain controller address. Before running the script make sure to have root-CA in place /usr/share/ca-certificates/root/CA-ROOT-SHA256-current.cer
Common error: The following client performed a SASL (Negotiate/Kerberos/NTLM/Digest) LDAP bind without requesting signing (integrity verification), or performed a simple bind over a clear text (non-SSL/TLS-encrypted) LDAP connection.