To enable LDAPS I need certificates on both domain controllers. I can't use Certificate Services as I don't have a spare Windows machine and installing that role on a DC is a big no-no, so I would rather use a self-signed certificate with SANs covering both DCs (FQDN and short machine names).
Anything should I pay attention? For example:
- should the certificate have a maximum duration (ie: 1, 5, 10, 100 years)?
- can this disrupt/affect connection with client machine (unlikely as the DC have no certificate at the moment);
- EFS - not having a CA means that clients themselves are responsible for their keys. What will happen with the self-signed certificate?
To enable LDAPS there is nothing special to pay attention to apart from the usual things when using SSL certificates. More details here:
Enable LDAP over SSL with a third-party certification authority
To answer your examples:
To test if your LDAPS is working properly you could use ldp.exe from the RSAT collection. Just change the the port to 636 and check the box at "SSL" when connecting.