<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Authentication Servers Microsoft 2022 AD + PfSense 2.7.0 - SSL]]></title><description><![CDATA[<p dir="auto">Hello,</p>
<p dir="auto">After a long search on the Internet, I came across many sources that finally did not solve my problem.<br />
I hope that asking my question on this forum will help find a solution.<br />
It is certainly a mistake on my part but I do not see it.</p>
<p dir="auto">I am looking to link my Pfsense 2.7.0 firewall with my Windows 2022 AD with a secure SSL/TLS connection.<br />
PFSENSE version: 2.7.0-RELEASE (amd64)<br />
Microsoft AD version: Windows 2022 Standard 21H2</p>
<p dir="auto">I followed several times procedures found on the Internet that I adapted to my installation without result.</p>
<p dir="auto">On the AD:</p>
<ul>
<li>I created an OU Pfsense</li>
<li>I created 2 accounts: 1 for the connection to the base and the other for the account that will have the right of administration of Pfsense.</li>
<li>I put them in a user group created in the OU.</li>
<li>I tested user authentication on AD -&gt; It works properly.</li>
<li>I validated the secure connection (port 636) to the LDAP directory with the ldp.exe utility</li>
</ul>
<p dir="auto">On PFsense:</p>
<ul>
<li>I validated the secure connection:<br />
<em><strong>openssl s_client -showcerts -connect "<a class="plugin-mentions-user plugin-mentions-a" href="/user/ip">@<bdi>ip</bdi></a> server AD":636</strong></em></li>
</ul>
<p dir="auto">The configurable fields for setting:</p>
<ul>
<li>Peer certificate Authority: Global Root CA List. I also tried the Certificate imported from my AD.</li>
<li>Search scope: Entire subtree</li>
<li>On the line "base DN": DC=YYY;DC=ZZ</li>
<li>One the line "bind credentials" I tried the <strong>Unique name format</strong> (CN=xxx;OU=xxx;DC=yyy;DC=ZZ), then the <strong>UPN</strong> format (user@domaine.com) and finally the format <strong>domain\user</strong>.</li>
</ul>
<p dir="auto">The problem is always the same:<br />
There is an error connecting to the LDAP server: <strong><strong>"Could not connect to the LDAP server. Please check the LDAP configuration"</strong></strong> in red above the "save" button</p>
<ul>
<li><strong>"Select container"</strong> impossible.</li>
<li>connection test <em>Diagnostics/Authentication</em> -&gt; <strong>erreur 504 Gateway Time-out</strong></li>
<li>I tried to unsecured Standard TCP without success.</li>
</ul>
<p dir="auto">Below is an extract of the system logs:<br />
<em>Oct 27 17:13:08	php-fpm	65323	/diag_authentication.php: ERROR! Could not bind to LDAP server ACTIVE DIRECTORY. Please check the bind credentials.<br />
Oct 27 17:14:06	php-fpm	64541	/system_authservers.php: ERROR! ldap_get_user_ous() could not bind to server .</em></p>
<p dir="auto">I am thinking of a syntax error perhaps, but I am no longer very clear about this problem.</p>
<p dir="auto">Sorry if my English is not perfect.</p>
<p dir="auto">Thank you in advance for the time you would spend on my problem.</p>
]]></description><link>https://forum.netgate.com/topic/183685/authentication-servers-microsoft-2022-ad-pfsense-2-7-0-ssl</link><generator>RSS for Node</generator><lastBuildDate>Wed, 22 Apr 2026 18:01:41 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/183685.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 27 Oct 2023 15:39:38 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Authentication Servers Microsoft 2022 AD + PfSense 2.7.0 - SSL on Mon, 20 Nov 2023 11:00:24 GMT]]></title><description><![CDATA[<p dir="auto">Hello,<br />
Sorry about the delay.</p>
<p dir="auto">In fact the problem did not come from the configuration but simply from a DNS problem. I hadn’t paid attention, but the ping test was coming back to me from the IPs which does not concern my Network. The domain I thought was not used on the web is used. To make a test I tried to clamp PFSENSE so that it only gets my DNS from the AD without success.<br />
I changed the name of my domain and this time I made sure it was mine.<br />
Now it works out.</p>
<p dir="auto">thank you for your help.</p>
]]></description><link>https://forum.netgate.com/post/1137327</link><guid isPermaLink="true">https://forum.netgate.com/post/1137327</guid><dc:creator><![CDATA[loic83]]></dc:creator><pubDate>Mon, 20 Nov 2023 11:00:24 GMT</pubDate></item><item><title><![CDATA[Reply to Authentication Servers Microsoft 2022 AD + PfSense 2.7.0 - SSL on Fri, 03 Nov 2023 09:32:33 GMT]]></title><description><![CDATA[<p dir="auto">OK,</p>
<p dir="auto">I’ve reconfigured to SSL on port 636.</p>
<p dir="auto">The LDP.exe software confirms that the SSL connection is correct on the LDAP of my AD..</p>
<p dir="auto">A Wireshark analysis on my AD shows that there is no LDAP dialog on the server with my firewall when I run an authentication test from PFSENSE.<br />
LDAP works well because the AD dialogue with the NAS that hosts the data.</p>
<p dir="auto">The problem should occur in the SSL dialog and the Certificate configuration on PFSENSE or AD.<br />
I will start from scratch this configuration. if you have leads, I am interested.</p>
]]></description><link>https://forum.netgate.com/post/1133685</link><guid isPermaLink="true">https://forum.netgate.com/post/1133685</guid><dc:creator><![CDATA[loic83]]></dc:creator><pubDate>Fri, 03 Nov 2023 09:32:33 GMT</pubDate></item><item><title><![CDATA[Reply to Authentication Servers Microsoft 2022 AD + PfSense 2.7.0 - SSL on Thu, 02 Nov 2023 16:49:46 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/loic83">@<bdi>loic83</bdi></a> said in <a href="/post/1133564">Authentication Servers Microsoft 2022 AD + PfSense 2.7.0 - SSL</a>:</p>
<blockquote>
<p dir="auto">Hello,</p>
<p dir="auto">Thanks for your interest.</p>
<p dir="auto">Even in "Standard TCP" on port 389 it does not work.<br />
I didn’t have time today, tomorrow I’m doing a wireshark capture test.</p>
</blockquote>
<p dir="auto">That doesn't surprise me. Microsoft stopped enabling LDAP (not LDAPS) by default many years ago, I believe there is a registry override for it but you shouldn't do that.</p>
]]></description><link>https://forum.netgate.com/post/1133569</link><guid isPermaLink="true">https://forum.netgate.com/post/1133569</guid><dc:creator><![CDATA[cmcdonald]]></dc:creator><pubDate>Thu, 02 Nov 2023 16:49:46 GMT</pubDate></item><item><title><![CDATA[Reply to Authentication Servers Microsoft 2022 AD + PfSense 2.7.0 - SSL on Thu, 02 Nov 2023 16:26:37 GMT]]></title><description><![CDATA[<p dir="auto">Hello,</p>
<p dir="auto">Thanks for your interest.</p>
<p dir="auto">Even in "Standard TCP" on port 389 it does not work.<br />
I didn’t have time today, tomorrow I’m doing a wireshark capture test.</p>
]]></description><link>https://forum.netgate.com/post/1133564</link><guid isPermaLink="true">https://forum.netgate.com/post/1133564</guid><dc:creator><![CDATA[loic83]]></dc:creator><pubDate>Thu, 02 Nov 2023 16:26:37 GMT</pubDate></item><item><title><![CDATA[Reply to Authentication Servers Microsoft 2022 AD + PfSense 2.7.0 - SSL on Sat, 28 Oct 2023 23:54:04 GMT]]></title><description><![CDATA[<p dir="auto">Does it work without SSL?</p>
<p dir="auto">Check this: <a href="https://docs.netgate.com/pfsense/en/latest/troubleshooting/authentication.html#ldap-authentication-server-troubleshooting" target="_blank" rel="noopener noreferrer nofollow ugc">https://docs.netgate.com/pfsense/en/latest/troubleshooting/authentication.html#ldap-authentication-server-troubleshooting</a></p>
<p dir="auto">Steve</p>
]]></description><link>https://forum.netgate.com/post/1132718</link><guid isPermaLink="true">https://forum.netgate.com/post/1132718</guid><dc:creator><![CDATA[stephenw10]]></dc:creator><pubDate>Sat, 28 Oct 2023 23:54:04 GMT</pubDate></item></channel></rss>