Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    ldap user manager

    Scheduled Pinned Locked Moved General pfSense Questions
    9 Posts 2 Posters 816 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      michmoor LAYER 8 Rebel Alliance
      last edited by michmoor

      Is it possible to use LDAP with User manager but not define a username on the firewall first.
      For example, anyone in my CN=Admins group would be given admin rights to the firewall?
      Would help in scalability as having over 10 firewalls to manage is a task.

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        Yes. Only the user group has to exist on the firewall if you want remotely defined users to inherit permissions.

        M 1 Reply Last reply Reply Quote 1
        • M
          michmoor LAYER 8 Rebel Alliance @stephenw10
          last edited by

          @stephenw10 Really? Burying the lead here Stephen :)
          So what do i have to do here?

          I assume scope is Remote.
          Group Name is my ldap DN?

          f809ccb6-927e-47c0-899d-26ea49f5c88a-image.png

          Firewall: NetGate,Palo Alto-VM,Juniper SRX
          Routing: Juniper, Arista, Cisco
          Switching: Juniper, Arista, Cisco
          Wireless: Unifi, Aruba IAP
          JNCIP,CCNP Enterprise

          M 1 Reply Last reply Reply Quote 0
          • M
            michmoor LAYER 8 Rebel Alliance @michmoor
            last edited by michmoor

            It seems to work but i get a page that says no

            Message from syslogd@GAFW at May 15 20:43:03 ...
            php-fpm[85968]: /index.php: Successful login for user 'michael' from: 192.168.50.241 (LDAP/LDAP-SYNOLOGY)
            
            

            952947b9-eb0a-4297-86ba-df8710ba6817-image.png
            20284288-77ba-4add-823a-283acebaaad5-image.png
            fa39e510-d19d-4d04-8ec7-2c9b51188ed1-image.png
            fcfbe0d4-93a9-435b-902d-1ae3cd8e4167-image.png

            4127b0aa-8023-4ce3-90e7-7962b604cb72-image.png

            Firewall: NetGate,Palo Alto-VM,Juniper SRX
            Routing: Juniper, Arista, Cisco
            Switching: Juniper, Arista, Cisco
            Wireless: Unifi, Aruba IAP
            JNCIP,CCNP Enterprise

            M 1 Reply Last reply Reply Quote 0
            • M
              michmoor LAYER 8 Rebel Alliance @michmoor
              last edited by

              @stephenw10 I think i solved it. The ldap group has to be the exact same group created on the firewall.
              So i created cn=firewall_admins in ldap.
              I created a group on the firewall called firewall_admins and assigned it to be a member of the admins group locally.

              Firewall: NetGate,Palo Alto-VM,Juniper SRX
              Routing: Juniper, Arista, Cisco
              Switching: Juniper, Arista, Cisco
              Wireless: Unifi, Aruba IAP
              JNCIP,CCNP Enterprise

              1 Reply Last reply Reply Quote 1
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                Yes the group name has to match exactly. Nice. ๐Ÿ‘

                M 1 Reply Last reply Reply Quote 0
                • M
                  michmoor LAYER 8 Rebel Alliance @stephenw10
                  last edited by

                  @stephenw10 Curious, but could something like this be added to the documentation as a recipe? Using the Netgate youtube official video on LDAP/RADIUS along with the documentation did take me over the finish line.

                  I noticed that only one LDAP server is able to be used for user manager authentication. My thought process is then to put my LDAP servers behind HA Proxy (tcp mode). What do you think? Pfsense should in theory get the ldap requests, send to the front end and get them delivered to one of my backends.

                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                  Routing: Juniper, Arista, Cisco
                  Switching: Juniper, Arista, Cisco
                  Wireless: Unifi, Aruba IAP
                  JNCIP,CCNP Enterprise

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    I've seen people use LDAP load balancers but I'm not sure I've seen HAProxy used for that.

                    M 1 Reply Last reply Reply Quote 0
                    • M
                      michmoor LAYER 8 Rebel Alliance @stephenw10
                      last edited by

                      @stephenw10 Well..it works ๐Ÿ˜Š

                      I created a VIP on the pfsense.
                      Created my backend pool
                      Created my tcp front end.
                      Created an ACL matching 0.0.0.0/0 and using the default pool for ldap

                      Works like a charm.

                      Obviously, for larger implementations, i wouldn't do this but if you are a small to midsize operation with a need for ldap, why not use pfsense with built in proxy to handle it.

                      Firewall: NetGate,Palo Alto-VM,Juniper SRX
                      Routing: Juniper, Arista, Cisco
                      Switching: Juniper, Arista, Cisco
                      Wireless: Unifi, Aruba IAP
                      JNCIP,CCNP Enterprise

                      1 Reply Last reply Reply Quote 1
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.