First, install Active Directory Certificate Services (AD CS) by doing the following:
Dashboard → Add roles and features.Before You Begin, simply select the button Next >.Installation Type, keep the radio button Role-based or feature-based installation enabled and select the button Next >.Server Selection, choose the server that you wish to be the root CA and select the button Next >.
Server Roles, tick Active Directory Certificate Services, select the button Add Features, and select the button Next >.
Features, simply select the button Next >.AD CS, select the button Next >.Role Services, simply select the button Next >.
Confirmation, simply select the button Install.
Configure Active Directory Certificate Services on the destination server.
Credentials, assuming you’re signed in as an administrator, simply select the button Next >.Role Services, check the tickbox Certification Authority then select the button Next >.
In the section Setup Type, choose your preferred CA type (prefered Entreprise CA ) then select the button Next >.

In the section CA Type, select the radio button Root CA then select the button Next >.

Private Key, select the radio button Create a new private key then select the button Next >.Cryptography, select :RSA#Microsoft Software Key Storage Provider2048 (at least) or 4096 (recommended)SHA256 (at least)Next >:
CA Name, change the defaults to DC01.example.local, for example.CN=<server’s FQDN>.Next >:
Validity Period, simply select the button Next >.Certificate Database, simply select the button Next >.Confirmation, simply select the button Configure.
Results, simply select the button Close.
Once the certificate has been installed, the DC server’s bindings need to be updated.
renew.txt with the following content:dn:
changetype: modify
add: renewServerCertificate
renewServerCertificate: 1
-
ldifde -i -f renew.txt
To check if LDAP ssl and 636 is open, in PowerShell run
ldp ldaps://yourhostname