The Active Directory documentation [1] says you can use the `hudson.plugins.active_directory.ActiveDirectorySecurityRealm.forceLdaps` system property to force connecting via LDAPS. This is broken.

      The following pull request updates the code to use this system property:
      https://github.com/jenkinsci/active-directory-plugin/pull/8

      It also changes the default LDAPS port from 686 to 636.

      [1] https://wiki.jenkins-ci.org/display/JENKINS/Active+Directory+plugin#ActiveDirectoryplugin-SecuringaccesstoActiveDirectoryservers

          [JENKINS-21073] Fix forceLdaps system property

          Brandon Turner created issue -
          Stafford Ritchie made changes -
          Assignee New: Stafford Ritchie [ eyeeyeeye ]
          R. Tyler Croy made changes -
          Workflow Original: JNJira [ 152935 ] New: JNJira + In-Review [ 178359 ]
          FĂ©lix Belzunce Arcos made changes -
          Resolution New: Fixed [ 1 ]
          Status Original: Open [ 1 ] New: Closed [ 6 ]
          Sebastian Willdo made changes -
          Resolution Original: Fixed [ 1 ]
          Status Original: Closed [ 6 ] New: Reopened [ 4 ]

            eyeeyeeye Stafford Ritchie
            blt04 Brandon Turner
            Votes:
            2 Vote for this issue
            Watchers:
            7 Start watching this issue

              Created:
              Updated: