Difference between revisions of "Configuring LDAP based authentication for openVPN"

From Notes_Wiki
m
m
Line 1: Line 1:
<yambe:breadcrumb>LDAP servers|LDAP servers</yambe:breadcrumb>
[[Main Page|Home]] > [[CentOS]] > [[CentOS 6.x]] > [[LDAP servers]] > [[Configuring LDAP based authentication for openVPN]]
=Configuring LDAP based authentication for openVPN=


TO configure LDAP based authentication for openvpn use these steps:
TO configure LDAP based authentication for openvpn use these steps:
Line 21: Line 20:




<yambe:breadcrumb>LDAP servers|LDAP servers</yambe:breadcrumb>
 
 
[[Main Page|Home]] > [[CentOS]] > [[CentOS 6.x]] > [[LDAP servers]] > [[Configuring LDAP based authentication for openVPN]]

Revision as of 15:29, 13 March 2022

Home > CentOS > CentOS 6.x > LDAP servers > Configuring LDAP based authentication for openVPN

TO configure LDAP based authentication for openvpn use these steps:

  1. Install openvpn-auth-ldap plugin using 'yum -y install openvpn-auth-ldap'
  2. Use 'chown -R openvpn:openvpn /etc/openvpn/auth'
  3. Edit '/etc/openvpn/auth/ldap.conf' file and add appropriate values. Avoid use of TLS using testing by setting 'TLSEnable no'. Also modify default search filter to 'SearchFilter "(uid=%u)"' assuming accountStatus field is not present in the schema.
  4. Edit 'server.conf' and add following line:
    plugin /usr/lib64/openvpn/plugin/lib/openvpn-auth-ldap.so /etc/openvpn/auth/ldap.conf
  5. Use 'service openvpn restart'
  6. Test the configuration by connecting to VPN. Note that the client configuration should have:
    auth-user-pass
    auth-retry interact
  7. If connection is successful optionally try using TLS for openVPN and LDAP server communication




Home > CentOS > CentOS 6.x > LDAP servers > Configuring LDAP based authentication for openVPN