Setting ca-cert now auto-enables server-identity-check. Two-line fix; thirty-minute root cause.
You move a working FortiGate LDAPS configuration from 7.2 to 7.4 (or freshly stage a new one), and admin authentication starts failing silently. diagnose test authserver ldap returns success against your DCs from CLI, but real logins via SSL VPN, SSO, or admin login fail without a useful log line.
On 7.4, setting set ca-cert <name> on an LDAP server now automatically enables server-identity-check. If your AD environment uses self-signed CAs (very common in OT), the CA signature is fine but the subject of the DC certificate won't match the LDAP server's server value once strict identity check kicks in, and the bind fails.
Explicitly disable the identity check in the same edit block:
config user ldap
edit "AD-LDAPS"
set server "192.168.236.3"
set secure ldaps
set ca-cert "LDAP_CA"
set server-identity-check disable
next
end
Move off self-signed -- either by issuing DC certificates from an internal CA whose subject matches the LDAP server value, or by load-balancing LDAPS through a FortiGate VIP with a matching cert. Then leave server-identity-check enabled.