Active Directory LDAP Example

In this example, AZTCO-FW is setup to connect to an Active Directory structure in order to authenticate users for a VPN. The results are restricted to the VPNUsers group. Omit the Extended Query to accept any user.

Descriptive Name ExCoADVPN

Type LDAP

Hostname or IP Address 192.0.2.230

Port 389

Transport TCP – Standard

Protocol Version 3

Search Scope Entire Subtree , DC=domain,DC=local

Authentication Containers  CN=Users,DC=domain,DC=local Extended Query memberOf=CN=VPNUsers,CN=Users,DC=example,DC=com Bind Credentials Anonymous binds Unchecked

User DN CN=binduser,CN=Users,DC=domain,DC=local

Password secretsecret

Initial Template Microsoft AD

User Naming Attribute samAccountName

Group Naming Attribute cn

Group Member Attribute memberOf This example uses plain TCP, but if the Certificate Authority for the AD structure is imported under the Certificate Manager in AZTCO-FW, SSL may be used as well by selecting that option and choosing the appropriate CA from the Peer Certificate Authority drop down, and setting the Hostname to the common name of the server certificate