Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Need help with Active Directory configuration

    Scheduled Pinned Locked Moved General pfSense Questions
    16 Posts 4 Posters 5.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • keyserK
      keyser Rebel Alliance
      last edited by

      Anonymous binding does not work with 2012 R2.
      You need to create a user in AD that has rights to read attributes on other useraccounts.
      In a default AD a normal user has this right, but in an upgraded AD or a security thightend AD it does not. In such a situation you can work around this by adding your LDAP user to the "account operators" security group.
      Then you need setup Pfsense to use that account when binding to AD

      Love the no fuss of using the official appliances :-)

      1 Reply Last reply Reply Quote 0
      • T
        TyMac
        last edited by

        Ok so I unchecked anon-binding and used the same name for the user that was in the tutorial for the credentials. I created the same group "Router Admins" in the tutorial as well.

        Clicking on the select button on "Authentication containers" I get a pop up error:
        Could not connect to the LDAP server. Please check your LDAP configuration.

        And trying to test authentication from Diagnostics >> Authentication with the pfsense username I get

        The following input errors were detected:
        Authentication failed.

        nmap from pfsense shows 389 along with a bunch of other ports up and authentication is working for other hosts.

        I am not sure what is meant by "You need to create a user in AD that has rights to read attributes on other useraccounts. " I have added this user to account operators and I still get the same error. This is a new 2012 r2 server and there are no security tweaks.

        1 Reply Last reply Reply Quote 0
        • keyserK
          keyser Rebel Alliance
          last edited by

          Could you please post a picture of your updated lDAP auth page.

          As I understand it, you have created a user in AD, and you have added that user the "account operators" group, so that is all the prerequisites taken care of. Thus it must be your settings.

          Love the no fuss of using the official appliances :-)

          1 Reply Last reply Reply Quote 0
          • T
            TyMac
            last edited by

            By IDAP you mean my pfsense configuration right? I have attached that. The pfsense user is in AD in the Rotuer Admins, Domain Users, Account Operators. There is no pfsense user on the router but I do have an Router Admins group.

            update_idauth.png
            update_idauth.png_thumb

            1 Reply Last reply Reply Quote 0
            • keyserK
              keyser Rebel Alliance
              last edited by

              Hi

              1: The USERS folder in AD is actually not an OU but a Container (CN), so the proper path for authentication container would be: CN=Users,DC=Gamer,DC=local

              2: Can't recall if domain\ notation works. I use user@gamer.local for the username.

              That should work and sorry about the late replies :-)

              Love the no fuss of using the official appliances :-)

              1 Reply Last reply Reply Quote 0
              • T
                TyMac
                last edited by

                @keyser:

                Hi

                1: The USERS folder in AD is actually not an OU but a Container (CN), so the proper path for authentication container would be: CN=Users,DC=Gamer,DC=local

                2: Can't recall if domain\ notation works. I use user@gamer.local for the username.

                That should work and sorry about the late replies :-)

                Still not working - if I hit select beside Authentication containers I should be able to connect, correct? I cannot.

                1 Reply Last reply Reply Quote 0
                • keyserK
                  keyser Rebel Alliance
                  last edited by

                  Okay, thats really weird. Are you sure the user you entered can logon to your AD (try login on a workstation or connect to a share with that login)?
                  Are you sure you entered the correct address for you domain controller?
                  Are you sure LDAP unencrypted on 389 is open on your domain controller?

                  Love the no fuss of using the official appliances :-)

                  1 Reply Last reply Reply Quote 0
                  • M
                    marvosa
                    last edited by

                    OP, assuming your DC is at 192.168.80.100 and your domain is "gamer.local", it looks like you're close.  Just wanted to share what I see from my working config and yours.  Lets get it connected first, then you can refine it if necessary:

                    • No Peer Certificate Authority configured.  (This probably doesn't matter, but it's something I see that's different)

                    • Your Authentication containers should read…. "CN=Users,DC=gamer,DC=local"

                    • Under Bind credentials, for "User DN:" enter the short name (e.g.  DOMAIN\User)… i.e. use "gamer\administrator"

                    • Enter the password for the "administrator" account

                    • Click Save

                    All of your other options are identical to mine.  At this point, you should be able to click on the "Select" button in the "Authentication containers" section and it should pull up all of your current containers and OU's.

                    1 Reply Last reply Reply Quote 0
                    • T
                      TyMac
                      last edited by

                      Ok using an account with domain admin privs allowed me to connect. I then clicked in select on authentication containers and choose CN=Users,DC=gamer,DC=local. After that I clicked on Diagnostics >> Authentication and tested connecting with the same admin user which worked and told me that user was part of the "Router Admins" group. I had added that user to that group while setting the initial AD config.

                      So thanks! Should there be any settings I should invest in configuring to help lock down AD access?

                      1 Reply Last reply Reply Quote 0
                      • keyserK
                        keyser Rebel Alliance
                        last edited by

                        With the current config you are not testing if a user is a member of a the "router admins" group. You are simply testing if the user exists in the USERS container in AD.
                        If you want to test for group membership you need to use the extended query feature tto check the MemberOF  attribute.

                        Love the no fuss of using the official appliances :-)

                        1 Reply Last reply Reply Quote 0
                        • T
                          TyMac
                          last edited by

                          @keyser:

                          With the current config you are not testing if a user is a member of a the "router admins" group. You are simply testing if the user exists in the USERS container in AD.
                          If you want to test for group membership you need to use the extended query feature tto check the MemberOF  attribute.

                          I'm still pretty new to LDAP notation. Can you tell me what my extended query string should look like?

                          1 Reply Last reply Reply Quote 0
                          • T
                            TyMac
                            last edited by

                            Also, I still cannot actually log in with the AD admin user. Not sure what else I need to configure.

                            1 Reply Last reply Reply Quote 0
                            • D
                              doktornotor Banned
                              last edited by

                              @TyMac:

                              Also, I still cannot actually log in with the AD admin user.

                              Cannot log in where? You know, this works just fine here for the WebGUI, with RouterAdmins AD group, and same pfS local group with proper permissions assigned. Worked in 2.1.x, still works with 2.2. Also working for OpenVPN + Radius/AD.

                              Post some logs/info, nothing to work with here!

                              1 Reply Last reply Reply Quote 0
                              • T
                                TyMac
                                last edited by

                                @doktornotor:

                                @TyMac:

                                Also, I still cannot actually log in with the AD admin user.

                                Cannot log in where? You know, this works just fine here for the WebGUI, with RouterAdmins AD group, and same pfS local group with proper permissions assigned. Worked in 2.1.x, still works with 2.2. Also working for OpenVPN + Radius/AD.

                                Post some logs/info, nothing to work with here!

                                Can't log in to the pfsense web admin page with the admin AD user I created that works with the bind credentials parameter.  What log do you want me to post?

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.