Blue Prism does not specify a port on the request to the Active Directory server, so it utilizes the default port for the LDAP protocol (389).
A recent security finding has identified that applications connecting to Windows Active Directory LDAP over a non-secure port 389 are vulnerable to attacks. To mitigate and completely resolve the security finding prior to the mandatory Microsoft Security Patch due in March 2020.
In E1/E2/E3 the requests to lDAP on port 389 will be nullified after Patch in March.
Application teams will need to modify their connections to a secure LDAP using port 636
This is time-sensitive matter and would like to expedite a resolution, Please support this idea.
Thanks,
Nagarjuna Atukuri