Just wondering if there is any help that can be given to this issue or am I
one of the first to do this and will have to blaze my own trail?

Is it possible to break this down into individual pieces that I can get
some help with and then maybe we can have success. I am documenting what
I'm trying so we can have a write-up on how to do this with Okta LDAP.

Thanks

On Wed, May 15, 2024 at 10:11 AM Brian Blater <
brian.blater+packetfe...@digitalturbine.com> wrote:

> New user to PacketFence. As our company is moving away from AD to Okta
> for our IdP, I need to replace our Windows NPS for authenticating our
> Wifi users. I've been posting on reddit in the r/PacketFence there,
> but I understand this is the better place to get assistance. So I'm
> going to try here.
>
> Here is what I have so far:
>
> I've created the realm for our domain. I have created a RADIUS
> authentication source and associated it with the created realm. No
> rules created at this time. I have also created an LDAP authentication
> source to our Okta LDAP interface and associated that to our realm.
> The test with the associated Bind DN is successful. I've tried
> creating a rule using LDAP selecting member is member of
> dn=Wireless_Users_Group,ou=groups,dc=domain,dc=okta,dc=com with action
> Role - default and Access Duration - 1 day.
>
> Using ldap search as follows:
> ldapsearch -D "uid=serv...@domain.com,ou=users, dc=domain, dc=okta,
> dc=com" -W -H ldaps://domain.ldap.okta.com -b dc=domain,dc=okta,dc=com
> uid=test...@domain.com \* +
> This will list the various attributes of the user, but does not list
> the groups the user is a member of.
>
> To list groups the user is a member of I can do the following ldap search:
>
> ldapsearch -x -H ldaps://domain.ldap.okta.com -D
> "uid=serv...@domain.com,ou=users,dc=domain,dc=okta,dc=com" -W -b
> dc=domain,dc=okta,dc=com uid=test...@domain.com memberOf
>
> This will show me a long list of groups the user is a member of in the
> following format:
> memberOf: cn=miro_users,ou=groups,dc=domain,dc=okta,dc=com
>
> This is different from the typical AD approach to getting memberOf.
>
> I get the following when doing a radtest:
>
> radtest u...@domain.com <password> localhost:18120 12 testing123
> Sent Access-Request Id 184 from 0.0.0.0:57241 to 127.0.0.1:18120 length
> 106
> User-Name = "u...@domain.com"
> User-Password = "<password>"
> NAS-IP-Address = 127.0.1.1
> NAS-Port = 12
> Message-Authenticator = 0x00
> Cleartext-Password = "<password>"
>
> The above is repeated 3 times and then I get:
> (0) No reply from server for ID 184 socket 3
>
> Obviously Okta is not the usual IdP for RADIUS from what I can see and
> their LDAP implementation may be a bit different. In my google
> searches I see that players like SecureW2 using FreeRADIUS on the
> backend are using SAML connectivity with Okta. I've configured a SAML
> authentication source in PF, but that is as far as I've got so far.
>
> I tried to start PF FreeRADIUS in debug mode, but didn't have any
> success. In System Configuration | Services I stopped radiusd and
> radiusd-auth and tried using the following: freeradius -X -d
> /usr/local/pf/raddb -n auth
> That fails binding to status address of 127.0.0.1 port 18121: Address
> already in use. So, not sure how to get debug mode working to see more
> info on what is happening in RADIUS.
>
> At this point I'm pretty lost. Not sure what steps I'm missing in all
> of this and have tried to follow documentation to set things up, but
> I'm obviously missing some stuff.
>
> The goal is to get users to authenticate against Okta for Wifi access,
> if they belong to a certain group. Then depending on that group assign
> them the correct VLAN. We are using Unifi APs with a Unifi Cloud Key
> and have that currently working in NPS. Just need to move it over to
> PacketFence.
>
> Any assistance you can provide to get me working would be greatly
> appreciated.
>
> Thanks,
> Brian
>
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to