- /
- /
- /
Active Directory LDAP Example
In this example, AZTCO-FW is setup to connect to an Active Directory structure in order to authenticate users for a VPN. The results are restricted to the VPNUsers group. Omit the Extended Query to accept any user.
Descriptive Name ExCoADVPN
Type LDAP
Hostname or IP Address 192.0.2.230
Port 389
Transport TCP – Standard
Protocol Version 3
Search Scope Entire Subtree , DC=domain,DC=local
Authentication Containers CN=Users,DC=domain,DC=local Extended Query memberOf=CN=VPNUsers,CN=Users,DC=example,DC=com Bind Credentials Anonymous binds Unchecked
User DN CN=binduser,CN=Users,DC=domain,DC=local
Password secretsecret
Initial Template Microsoft AD
User Naming Attribute samAccountName
Group Naming Attribute cn
Group Member Attribute memberOf This example uses plain TCP, but if the Certificate Authority for the AD structure is imported under the Certificate Manager in AZTCO-FW, SSL may be used as well by selecting that option and choosing the appropriate CA from the Peer Certificate Authority drop down, and setting the Hostname to the common name of the server certificate