Let me TRY to address a couple points here. 1.) Admins "logging in" to network devices: telnet, ssh, etc.
The Network Device, if "properly" configured, sends a RADIUS request to the RADIUS server. If you run FR in debug mode you'll see the request come in and all the attributes thereof. FR, based on the "policy" you configure will pick one of several methods to authenticate the user. Could be the users file, MySQL, LDAP, ntlm_auth, etc. Personally I use ntlm_auth because: 1.) I'm not very skilled in the details of LDAP and "thought" it would be more difficult to get up and running correctly. 2.) Like you my understanding was / is certain types of RADIUS auth requests (such as 802.1x type stuff) "needs" ntlm_auth as LDAP / AD typically doesn't store passwords in the proper format... Which leads me to scenario 2.) 2.) ntlm_auth is "typically" required for 802.1x (*EAP) stuff as LDAP / AD doesn't typically store the passwords in a ... "compatible" format. I too have read where you *can* use LDAP to authenticate *EAP IF you store the user passwords in a certain format. BUT, getting AD admins to do that is not likely when a viable alternative exists; ie: ntlm_auth. My suggestion - just to get things "working" so you can play with it and learn more by actually seeing valid request / reply convos: 1.) Use only ntlm_auth. If necessary you can use "require-membership-of" (I forget exact syntax) to ensure only members of "Network Admins" can get a cli on your network gear. It will also work for 802.1x 2.) If necessary set your default auth type to ntlm_auth. This is discussed in docs and suggested only for testing. As I've mentioned before I had to leave it in place as I probably don't have something configured "correctly", BUT, right now 100% of my auth uses ntlm_auth - so it works. This has grown into quite a thread and it's spawned some VERY useful info from some of the FR veterans that has helped me a lot. I have lost track of where you are / what probs you're still having... I will have more time next week and will try to help you more if you still need it. G -----Original Message----- From: freeradius-users-bounces+ggatten=waddell....@lists.freeradius.org [mailto:freeradius-users-bounces+ggatten=waddell....@lists.freeradius.org] On Behalf Of Moe, John Sent: Wednesday, July 20, 2011 6:07 PM To: FreeRadius users mailing list Subject: RE: Trying to wrap my head around FreeRadius config > -----Original Message----- > So ask *specific* questions about what you expect, what's happening, > and what you think is going wrong. > Ask small questions, instead of long ones. It really makes a > difference. Well, ok, I'll start again, go as far as I can, and then ask questions about what I'm seeing and what I don't understand. > Users don't log into switches. Details matter. They do if they need to configure the switch. I meant admin users, not general users, but it's still authenticating a user account using RADIUS. > In any case... just configure AD as an LDAP server. Uncomment "ldap" > in raddb/sites-enabled/default. It *will* work. Hang on, this works? I thought I'd read online again and again that if you're authenticating against Active Directory, you must use ntlm_auth, because AD doesn't respond properly to the LDAP and KRB modules? I'd specifically tried to research this very question, and thought I'd come out with the understanding ntlm_auth needed to be used? Will LDAP work properly against AD? > I have no idea why this is a problem. Follow the guide on > http://deployingradius.com. It's detailed, and it works. Which specific guide are you talking about? Or are you talking about the several individual guides I'd mentioned before? > Alan DeKok. John H. Moe Network Support - Hatch IT HATCH Tel: +61 (7) 3166 7777 Direct: +61 (7) 3166 7684 Fax: +61 (7) 3368 3754 Mobile: +61 438 772 425 61 Petrie Terrace, Brisbane, Queensland Australia 4011 ***************************** NOTICE - This message from Hatch is intended only for the use of the individual or entity to which it is addressed and may contain information which is privileged, confidential or proprietary. Internet communications cannot be guaranteed to be secure or error-free as information could be intercepted, corrupted, lost, arrive late or contain viruses. By communicating with us via e-mail, you accept such risks.? When addressed to our clients, any information, drawings, opinions or advice (collectively, "information") contained in this e-mail is subject to the terms and conditions expressed in the governing agreements.? Where no such agreement exists, the recipient shall neither rely upon nor disclose to others, such information without our written consent.? Unless otherwise agreed, we do not assume any liability with respect to the accuracy or completeness of the information set out in this e-mail.? If you have received this message in error, please notify us immediately by return e-mail and destroy and delete the message from your computer. <font size="1"> <div style='border:none;border-bottom:double windowtext 2.25pt;padding:0in 0in 1.0pt 0in'> </div> "This email is intended to be reviewed by only the intended recipient and may contain information that is privileged and/or confidential. If you are not the intended recipient, you are hereby notified that any review, use, dissemination, disclosure or copying of this email and its attachments, if any, is strictly prohibited. If you have received this email in error, please immediately notify the sender by return email and delete this email from your system." </font> - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

