NagarjunaAtukur
Level 4
Options
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Subscribe
- Email to a Friend
- Printer Friendly Page
- Report Inappropriate Content
24-01-20
05:30 AM
Status:
Not Planned
Blue Prism does not specify a port on the request to the Active Directory server, so it utilizes the default port for the LDAP protocol (389).
A recent security finding has identified that applications connecting to Windows Active Directory LDAP over a non-secure port 389 are vulnerable to attacks. To mitigate and completely resolve the security finding prior to the mandatory Microsoft Security Patch due in March 2020.
In E1/E2/E3 the requests to lDAP on port 389 will be nullified after Patch in March.
Application teams will need to modify their connections to a secure LDAP using port 636
This is time-sensitive matter and would like to expedite a resolution, Please support this idea.
Thanks,
Nagarjuna Atukuri
A recent security finding has identified that applications connecting to Windows Active Directory LDAP over a non-secure port 389 are vulnerable to attacks. To mitigate and completely resolve the security finding prior to the mandatory Microsoft Security Patch due in March 2020.
In E1/E2/E3 the requests to lDAP on port 389 will be nullified after Patch in March.
Application teams will need to modify their connections to a secure LDAP using port 636
This is time-sensitive matter and would like to expedite a resolution, Please support this idea.
Thanks,
Nagarjuna Atukuri
8 Comments
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.