@datafaber & @weehooey So I have freeradius3 working on my pfsense fw, both as a ldap authentication under user manager and ldap over ssl with bind to ldap.google.com using google provided cert.
It involved manually editing the conf files, if you make any changes in the web ui it will over write with the incorrect settings.
I am documenting this as I need to take this from test env to real even for 2fa.
https://www.nasirhafeez.com/freeradius-with-google-g-suite-workspace-secure-ldap-for-wpa2-enterprise-wifi/
following this article I was able to get an ubuntu vm running and connecting freeradius3 to google ldap. then adapting it to follow how the pfsense freeradius wants it.
I uploaded the crt and key into cert manager on pfsense.
defined everything in the gui like bind user / pass
Setup the two interface ports
interface.png
I did the NAS/Client
nas-client.png
I checked disable weak EAP types: MD5 and GTC and set Default EAP type to TTLS
eap.png
Selected SSL Server Cert to my google imported cert
eap2.png
Set EAP TTLS Default EAP Type to GTC
eap3.png
Enabled both LDAP Auth
plugged in Server address ldap.google.com port 636 and bind user / password
ldaptopclean.png
Enable TLS support, selected my SSL Server Cert imported from google and set Verification to ALLOW
ldaptls.png
fun part editing manually:
Edit the default virtual server:
nano /etc/freeradius/3.0/sites-enabled/default which is /usr/local/etc/raddb/sites-enabled/default
In authorize section after pap add this:
if (User-Password) {
update control {
Auth-Type := ldap
}
}
making it look like this following the working config from the running freeradius3 server
default.png
once restarted the radiusd service I was able to authenticate using the radius server under Authentication Servers
authentication.png
testuser.png
What I could use help with is getting the syntax correct for groups membership in ldap to show up in freeradius.
ldap-groups.png