Difference between revisions of "Configuring LDAP based authentication for openVPN"

From Notes_Wiki
(Created page with "<yambe:breadcrumb>OpenLDAP_server_configuration|OpenLDAP</yambe:breadcrumb> =Configuring LDAP based authentication for openVPN= TO configure LDAP based authentication for ope...")
 
m
Line 1: Line 1:
<yambe:breadcrumb>OpenLDAP_server_configuration|OpenLDAP</yambe:breadcrumb>
<yambe:breadcrumb>OpenLDAP</yambe:breadcrumb>
=Configuring LDAP based authentication for openVPN=
=Configuring LDAP based authentication for openVPN=


Line 17: Line 17:
#:</pre>
#:</pre>
#If connection is successful optionally try using TLS for openVPN and LDAP server communication
#If connection is successful optionally try using TLS for openVPN and LDAP server communication
<yambe:breadcrumb>OpenLDAP</yambe:breadcrumb>

Revision as of 04:04, 9 April 2014

<yambe:breadcrumb>OpenLDAP</yambe:breadcrumb>

Configuring LDAP based authentication for openVPN

TO configure LDAP based authentication for openvpn use these steps:

  1. Install openvpn-auth-ldap plugin using 'yum -y install openvpn-auth-ldap'
  2. Use 'chown -R openvpn:openvpn /etc/openvpn/auth'
  3. Edit '/etc/openvpn/auth/ldap.conf' file and add appropriate values. Avoid use of TLS using testing by setting 'TLSEnable no'. Also modify default search filter to 'SearchFilter "(uid=%u)"' assuming accountStatus field is not present in the schema.
  4. Edit 'server.conf' and add following line:
    plugin /usr/lib64/openvpn/plugin/lib/openvpn-auth-ldap.so /etc/openvpn/auth/ldap.conf
  5. Use 'service openvpn restart'
  6. Test the configuration by connecting to VPN. Note that the client configuration should have:
    auth-user-pass
    auth-retry interact
  7. If connection is successful optionally try using TLS for openVPN and LDAP server communication



<yambe:breadcrumb>OpenLDAP</yambe:breadcrumb>