Re: LDAP authorization

2013-03-07 Thread Alan DeKok
Matthew Ceroni wrote: I am using LDAP authorization. What I am looking to accomplish is to reject/deny (so not even attempt authentication) for disabled users. I am authentication against AD (use LDAP for authorize and ntlm for authentication). If I were to search for all none disabled

Re: LDAP authorization

2013-03-07 Thread Matthew Ceroni
authorized to use remote access So then it continues onto the authorization part. How do I get it to reject if the user isn't found (or user is disabled)? On Thu, Mar 7, 2013 at 6:41 AM, Alan DeKok al...@deployingradius.comwrote: Matthew Ceroni wrote: I am using LDAP authorization. What I am looking

Re: LDAP authorization

2013-03-07 Thread Alan DeKok
Matthew Ceroni wrote: That is what I tried. So I set base_filter = ((objectclass=user)(!(userAccountControl:1.2.840.113556.1.4.803:=2))) But what I am finding is whether the user is found and enabled, user is found but disabled, or user isn't found at the output (from radius debug) shows

Re: LDAP authorization

2013-03-07 Thread Matthew Ceroni
Alan: Yes, that works when run through ldapsearch. I was able to get the attribute checking working (added to dictionary, then ldap.attrmap) so I can now reject based on the value of an attribute. Thanks for the input on that. However, if the user isn't found in LDAP (Active Directory), how do

Re: LDAP authorization

2013-03-07 Thread Olivier Beytrison
On 07.03.2013 22:06, Matthew Ceroni wrote: Alan: Yes, that works when run through ldapsearch. I was able to get the attribute checking working (added to dictionary, then ldap.attrmap) so I can now reject based on the value of an attribute. Thanks for the input on that. However, if the user

LDAP authorization

2013-03-06 Thread Matthew Ceroni
I am using LDAP authorization. What I am looking to accomplish is to reject/deny (so not even attempt authentication) for disabled users. I am authentication against AD (use LDAP for authorize and ntlm for authentication). If I were to search for all none disabled users using ldapsearch

RE: Slow Ldap Authorization

2013-01-15 Thread Tyler Brady
On 01/15/2013 07:45 AM, Phil Mayers wrote: Sorry, I've just realised another thing you can try - disable referral chasing. This is an option on the ldap module - try this: ldap { ... chase_referrals = no } This solved my problem. Thank you! - List info/subscribe/unsubscribe? See

RE: Slow Ldap Authorization

2013-01-14 Thread Tyler Brady
Can someone help point me in the right direction? LDAP is taking too long to authorize due to something in my configuration. Keep in mind that I am about as newb as you can get when it comes to this stuff. I apologize for my ignorance. Any help would be greatly appreciated. [ldap] Bind was

Re: Slow Ldap Authorization

2013-01-14 Thread Arran Cudbard-Bell
On 14 Jan 2013, at 23:35, Tyler Brady tbr...@stc-comm.com wrote: Can someone help point me in the right direction? LDAP is taking too long to authorize due to something in my configuration. Keep in mind that I am about as newb as you can get when it comes to this stuff. I apologize for my

RE: Slow Ldap Authorization

2013-01-14 Thread Tyler Brady
Look. This is absolutely not a RADIUS issue, you need to buy a book on LDAP and read up on referals, and escaping special characters. Anyone involved in AAA needs to know about these fundimental protocols, spoonfeeding you information will not help your understanding of them. -Arran

Re: Slow Ldap Authorization

2013-01-14 Thread Phil Mayers
On 01/11/2013 10:15 PM, Tyler Brady wrote: basedn = DC=company,DC=com Try setting a more specific (longer) base DN. As Arran has pointed out, you're getting LDAP referrals. Active Directory likes to do this if you query the LDAP tree from a point above 1 database, even though

Re: Slow Ldap Authorization

2013-01-14 Thread Phil Mayers
On 01/15/2013 07:45 AM, Phil Mayers wrote: On 01/11/2013 10:15 PM, Tyler Brady wrote: basedn = DC=company,DC=com Try setting a more specific (longer) base DN. As Arran has pointed out, you're getting LDAP referrals. Active Directory likes to do this if you query the LDAP tree from a

Slow Ldap Authorization

2013-01-11 Thread Tyler Brady
Version 2.1.10 Since adding LDAP authorization, my login time has slowed down quite a bit. It takes 4 or 5 seconds longer for freeRadius to get through all of the [ldap] fields and send an Access-Accept. Is this a normal amount of time, or is there something in my configuration that is causing

Re: Slow Ldap Authorization

2013-01-11 Thread Arran Cudbard-Bell
On 11 Jan 2013, at 22:15, Tyler Brady tbr...@stc-comm.com wrote: Version 2.1.10 Since adding LDAP authorization, my login time has slowed down quite a bit. It takes 4 or 5 seconds longer for freeRadius to get through all of the [ldap] fields and send an Access-Accept. Is this a normal

Re: FreeRadius (version 2.1.12) + ntlm_auth (AD) authentication + LDAP authorization

2013-01-10 Thread Phil Mayers
On 01/09/2013 08:42 PM, Matthew Ceroni wrote: It appears that when Windows sends the username it sends it as DOMAIN\\username. The \\ causes the 5c to appear in the username. I confirmed this by using the radtest tool and specifying the username as DOMAIN\\username. A single \ causes the

Re: FreeRadius (version 2.1.12) + ntlm_auth (AD) authentication + LDAP authorization

2013-01-09 Thread Phil Mayers
On 01/09/2013 12:43 AM, Matthew Ceroni wrote: Hi: I am running FreeRadius version 2.1.12 on a CentOS 6 machine. For authentication I am using AD (ntlm_auth) and this works create. In the the request the username is sent as just the plain username (ie: mceroni) and the NT-domain (ie: DOMAIN1).

Re: FreeRadius (version 2.1.12) + ntlm_auth (AD) authentication + LDAP authorization

2013-01-09 Thread Matthew Ceroni
It appears that when Windows sends the username it sends it as DOMAIN\\username. The \\ causes the 5c to appear in the username. I confirmed this by using the radtest tool and specifying the username as DOMAIN\\username. A single \ causes the username to appear as DOMAINusername so that is why

Re: FreeRadius (version 2.1.12) + ntlm_auth (AD) authentication + LDAP authorization

2013-01-09 Thread Matthew Ceroni
Phil: Thanks for the response. My understanding of what was happening with LDAP was actually incorrect. I thought it was binding as the admin DN I provided and then re-binding as the user that is trying to authenticate. The message returned was No known good password found for user. Which is just

FreeRadius (version 2.1.12) + ntlm_auth (AD) authentication + LDAP authorization

2013-01-08 Thread Matthew Ceroni
is on the authorization side in which I am using LDAP to grab the groups a user is in. In order to authentication against ldap my bind DN has to be DOMAIN\username (ie: DOMAIN1\mceroni). I am wondering how I modify the User-Name or Stripped user name just for the LDAP authorization part so make it DOMAIN

Re: FreeRadius, Active Directory, LDAP Authorization

2011-12-07 Thread suggestme
as suggested by deployingradius.com, which is successful. Now, I am doing Authorization using LDAP. Thanks -- View this message in context: http://freeradius.1045715.n5.nabble.com/FreeRadius-Active-Directory-LDAP-Authorization-tp5049129p5055785.html Sent from the FreeRadius - User mailing list

Re: FreeRadius, Active Directory, LDAP Authorization

2011-12-07 Thread Phil Mayers
On 07/12/11 14:22, suggestme wrote: Hi, After configuration and running the FreeRadius in debug mode, I see that binding with LDAP server is successful as : *[ldap] Bind was successful* Then it does searching of user with filter and gives the error as : *[ldap] ldap_search() failed: Operations

Re: FreeRadius, Active Directory, LDAP Authorization

2011-12-07 Thread Alan DeKok
suggestme wrote: Hi, After configuration and running the FreeRadius in debug mode, I see that binding with LDAP server is successful as : *[ldap] Bind was successful* Then it does searching of user with filter and gives the error as : *[ldap] ldap_search() failed: Operations error

Re: FreeRadius, Active Directory, LDAP Authorization

2011-12-07 Thread suggestme
with timestamp +7 Ready to process requests. Thanks -- View this message in context: http://freeradius.1045715.n5.nabble.com/FreeRadius-Active-Directory-LDAP-Authorization-tp5049129p5056936.html Sent from the FreeRadius - User mailing list archive at Nabble.com. - List info/subscribe/unsubscribe? See http

Re: FreeRadius, Active Directory, LDAP Authorization

2011-12-07 Thread Fajar A. Nugraha
On Thu, Dec 8, 2011 at 3:57 AM, suggestme samanaupadh...@hotmail.com wrote: Thank you all for the suggestions. I have already installed FreeRadius 2.1.12 which I am running, an I have got ldap in file /usr/local/etc/raddb/modules/ldap; I have gone through it and I am still not sure where the

Re: FreeRadius, Active Directory, LDAP Authorization

2011-12-07 Thread Alan DeKok
suggestme wrote: I have already installed FreeRadius 2.1.12 which I am running, an I have got ldap in file /usr/local/etc/raddb/modules/ldap; I have gone through it and I am still not sure where the problem lies. The problem is you. You were told to look for operations error in

FreeRadius, Active Directory, LDAP Authorization

2011-12-05 Thread suggestme
is the best way to achieve it. Any documentation/site/thread suggestion regarding this would be greately appreciated. Thanks, -- View this message in context: http://freeradius.1045715.n5.nabble.com/FreeRadius-Active-Directory-LDAP-Authorization-tp5049129p5049129.html Sent from the FreeRadius

Re: FreeRadius, Active Directory, LDAP Authorization

2011-12-05 Thread Alan DeKok
suggestme wrote: I have installed FreeRadius server 2.1.12, installed and configured Kerberos, Samba; configured ntlm_auth program for FreeRadius Authentication with Active Directory. Everything is successful and running smoothly till this stage. Now, I am in the phase of configuration of

Re: Group checking in ldap authorization

2011-03-23 Thread Alan DeKok
Robert Roll wrote: The below is out of the .../share/doc/freeradius/rlm_ldap Note that it shows the Ldap_Group variable being set in the users file, but I'm assuming it should not really matter where it gets set ? DEFAULT Ldap-Group == cn=disabled,dc=company,dc=com No. See

Re: Group checking in ldap authorization

2011-03-23 Thread Phil Mayers
On 03/22/2011 06:15 PM, Robert Roll wrote: This does seem to work differently than I thought.. Yeah, like I say: it's a virtual attribute that does the group search when you compare it. My model was something like ntlm_auth, which allows an authentication, but one can also require

RE: Group checking in ldap authorization

2011-03-23 Thread Robert Roll
, 2011 3:14 AM To: freeradius-users@lists.freeradius.org Subject: Re: Group checking in ldap authorization On 03/22/2011 06:15 PM, Robert Roll wrote: This does seem to work differently than I thought.. Yeah, like I say: it's a virtual attribute that does the group search when you compare

Group checking in ldap authorization

2011-03-22 Thread Robert Roll
I have an ldap module that I want to force to do group checking. Reading the documentation, it seems that there should be an attribute (I'm assuming control?) that should force that check ? i.e. instance-name-Ldap-Group .. I notice that the ldap module seems to have group checking disabled

Re: Group checking in ldap authorization

2011-03-22 Thread Phil Mayers
On 22/03/11 14:24, Robert Roll wrote: Below is what I have in my authorization section. I update control { ldapADut-Ldap-Group := cn=chemVLAN,OU=Groups,OU=UofURadius,dc=ad,dc=utah,dc=edu } ldapADut { notfound = reject } Where

RE: Group checking in ldap authorization

2011-03-22 Thread Robert Roll
@lists.freeradius.org [freeradius-users-bounces+robert.roll=utah@lists.freeradius.org] On Behalf Of Phil Mayers [p.may...@imperial.ac.uk] Sent: Tuesday, March 22, 2011 8:46 AM To: freeradius-users@lists.freeradius.org Subject: Re: Group checking in ldap authorization On 22/03/11 14:24, Robert

RE: Group checking in ldap authorization

2011-03-22 Thread Robert Roll
list Subject: RE: Group checking in ldap authorization The below is out of the .../share/doc/freeradius/rlm_ldap Note that it shows the Ldap_Group variable being set in the users file, but I'm assuming it should not really matter where it gets set ? DEFAULTLdap-Group == cn=disabled,dc

Re: freeradius2 with EAP-TLS and LDAP authorization

2010-07-04 Thread Alan DeKok
to do an LDAP query to check for authorization. How can I do the following in this exact order ? You edit the config files so that the ldap module is run after the users file. LDAP authorization is tryed first then comes authentication or am I wrong ? Yes. What I'd need is to extract

Re: freeradius2 with EAP-TLS and LDAP authorization ?

2010-07-03 Thread Alan DeKok
Riccardo Veraldi wrote: Hello, is it possible in some way to use EAP-TLS X509 authentication together with LDAP authorization in freeradius2 ? Yes. You can look the username up in LDAP, and reject the request if the user doesn't exist. Actually freeradius2 allows EAP-TLS authentication

Re: freeradius2 with EAP-TLS and LDAP authorization

2010-07-03 Thread Edgar Fuß
RV but if I wanted to extract the emailAddress or CN field from the RV X509 certificate and authorize it against my LDAP tree AdK The limitation isn't the users file. AdK It's that extracting the fields from the certificate is hard. I don't understand. rlm_eap's check_cert_cn must be able to

Re: freeradius2 with EAP-TLS and LDAP authorization

2010-07-03 Thread Alan DeKok
Edgar Fuß wrote: I don't understand. rlm_eap's check_cert_cn must be able to extract the CN from the user certificate in order to check it against User-Name (or whatever). Yes... Or at least, with check_cert_cn = %{User-Name}, you can substitute User-Name for an extracted CN for

Re: freeradius2 with EAP-TLS and LDAP authorization

2010-07-03 Thread Riccardo Veraldi
. How can I do the following in this exact order ? LDAP authorization is tryed first then comes authentication or am I wrong ? What I'd need is to extract the CN and check it against LDAP attributes... How might I do it ? thank you Riccardo Alan DeKok wrote: Edgar Fuß wrote: I don't

freeradius2 with EAP-TLS and LDAP authorization ?

2010-07-02 Thread Riccardo Veraldi
Hello, is it possible in some way to use EAP-TLS X509 authentication together with LDAP authorization in freeradius2 ? Actually freeradius2 allows EAP-TLS authentication, but if I wanted to extract the emailAddress or CN field from the X509 certificate and authorize it against my LDAP tree

krb Authenication ldap Authorization

2008-11-17 Thread Lisa Besko
I just want to double check that I can do what I need to do. I need to use radius to AUTHENTICATE users and then once they are authenticated have it pass it over to and LDAP server for Authorization, I believe this is possible with radius but if anyone has any experience with this or good

Re: krb Authenication ldap Authorization

2008-11-17 Thread tnt
I need to use radius to AUTHENTICATE users and then once they are authenticated have it pass it over to and LDAP server for Authorization, I believe this is possible with radius but if anyone has any experience with this or good links for setting it up I would appreciate it. Thanks, LB - List

Re: krb Authenication ldap Authorization

2008-11-17 Thread Lisa Besko
Thanks for the clarification. It seems backward to me but maybe that will become clearer as I work with it. Either way I think I can work with it. LB [EMAIL PROTECTED] wrote: I need to use radius to AUTHENTICATE users and then once they are authenticated have it pass it over to and LDAP

ldap authorization request in a post_proxy section?

2008-11-04 Thread Paul TAVERNIER
Hi, How should i call the ldap module in the post_proxy section (in Freeradius v1 or v2...)? It should perhaps be easier to ask a single question rather than in my long request posted yesterday...;o) In Freeradius v1, i can merge in an access-accept response radius attribute to

Re: ldap authorization request in a post_proxy section?

2008-11-04 Thread tnt
How should i call the ldap module in the post_proxy section (in Freeradius v1 or v2...)? It should perhaps be easier to ask a single question rather than in my long request posted yesterday...;o) In Freeradius v1, i can merge in an access-accept response radius attribute to

Re: LDAP authorization - Attribute User-Password is required for authentication

2008-06-17 Thread Neil Marjoram
Alan, Thanks, yes 2.0.5 ran out of box almost! Just got to customise the certs, sometime after testing. Still have a couple of issues I can't resolve, I'll post separately. Thanks, Neil. Alan DeKok wrote: Neil Marjoram wrote: I am using a Netgear WAG102 Wireless access point to autorise

LDAP authorization - Attribute User-Password is required for authentication

2008-06-16 Thread Neil Marjoram
I have now read many How-To's but don't seem to be able to find an answer, and I hope someone on the list can help. I am using a Netgear WAG102 Wireless access point to autorise to Radius, which in turn uses LDAP. radtest from the command line of the local host authenticates no problem, but I

Re: LDAP authorization - Attribute User-Password is required for authentication

2008-06-16 Thread Alan DeKok
Neil Marjoram wrote: I am using a Netgear WAG102 Wireless access point to autorise to Radius, which in turn uses LDAP. radtest from the command line of the local host authenticates no problem, but I understand that it is a possibility that the Netgear passes the Mac address of the laptop

Re: Re-write Attributes based upon NAS-Port-Type and LDAP authorization response

2006-06-26 Thread Alan DeKok
Bill Carr [EMAIL PROTECTED] wrote: My pseudo-code thought process is outlined below (I'm not a coder, would never profess to be; thus my post!): if NAS-Port-Type == Wireless - IEEE 802.11 then Tunnel-Medium-Type == IEEE-802

Re-write Attributes based upon NAS-Port-Type and LDAP authorization response

2006-06-21 Thread Bill Carr
Hello Folks, I've posted something similar to this in the past and my question was answered rather tersely. I'm hoping a little more detail will invoke the type of kind responses I'm used to in the Open Source Community. I've got FreeRadius on RedHat ES3 authenticating users to OpenLDAP. So

LDAP authorization for EAP-TLS authentication

2006-03-16 Thread Keith Moores
I'm trying to understand the relationship between the modules in the authorize {} and authenticate {} sections and how it relates to the directives defined in users. EAP-TLS works fine, but I can't seem to figure how to get make the ldap authorization reject a user. DEFAULT Auth-Type

Re: LDAP authorization for EAP-TLS authentication

2006-03-16 Thread Alan DeKok
-TLS works fine, but I can't seem to figure how to get make the ldap authorization reject a user. See the ldap section of radiusd.conf. You can say user is not allowed for remote access In the ldap server logs show multiple queries, which are not returning anything. This can be confirmed

CHAP Authentication But LDAP Authorization?

2005-09-09 Thread Adam Tauno Williams
I have CHAP (PEAP) authentication working against my Samba PDC via ntlm_auth. I want to use that authentication but have users and their parameters from an LDAP DSA (that contains the SAM Samba is using). I see that a radius schema file is included and has an auxilliary objectclass. But I

LDAP Authorization different VLAN

2005-07-19 Thread Felice Pizzurro
Hi, I have made a system of authorization with freeradius 1.0.4 based on LDAP attribute radiusGroupName and it works perfectly! Now I have this problem: I have on my access points two VLAN named data and students. I want to create different group for the authorization to access to this

Re: LDAP Authorization different VLAN

2005-07-19 Thread Dusty Doris
Hi, I have made a system of authorization with freeradius 1.0.4 based on LDAP attribute radiusGroupName and it works perfectly! Now I have this problem: I have on my access points two VLAN named data and students. I want to create different group for the authorization to access to this

Re: LDAP authorization filter question

2004-08-17 Thread J. Fowler
We are attempting to authenticate multiple users based on which Called-Station-ID or NAS-IP-Address. We would like to dynamically build the LDAP search filter based on the originating source. Is this possible? Yes. Those two docs (variables and the users man page) were what i needed to

AW: LDAP authorization filter question

2004-08-16 Thread Markus.Wintruff
Maybe huntgroups are that what you are looking for. Markus -Ursprüngliche Nachricht- Von: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Im Auftrag von J. Fowler Gesendet: Dienstag, 17. August 2004 00:08 An: [EMAIL PROTECTED] Betreff: LDAP authorization filter question Hello, ( radiusd

Ldap authorization - reject if not found

2004-04-19 Thread Alejandro Martínez Marcos
Hello, I would like to authorize the user against LDAP, and if LDAP returns error or not found set Auth-Type = Reject. What do I have to write in radiusd.conf to get this? I know that if no Auth-Type is set, the user will also be rejected, but this is not enough for me, because

Re: Ldap authorization - reject if not found

2004-04-19 Thread Alan DeKok
=?iso-8859-1?Q?Alejandro_Mart=EDnez_Marcos?= [EMAIL PROTECTED] wrote: I would like to authorize the user against LDAP, and if LDAP returns error or not found set Auth-Type = Reject. What do I have to write in radiusd.conf to get this? Nothing. I know that if no Auth-Type is

Re: Help with LDAP authorization using groupOfNames and huntgroups

2004-03-29 Thread Kostas Kalevras
On Fri, 26 Mar 2004, Casey Forbes wrote: Hello, I'm having a lot of trouble getting my freeradius (CVS snap 20040323) to Allow/Deny access based on membership in LDAP groups (where the group names are associated with huntgroups). rlm_ldap docs and the mailing list archive didn't help me

Re: Help with LDAP authorization using groupOfNames and huntgroups

2004-03-29 Thread Casey Forbes
On Mon, 29 Mar 2004, Kostas Kalevras wrote: rad_recv: Access-Request packet from host 127.0.0.1:40092, id=100, length=59 User-Name = cforbes User-Password = NAS-IP-Address = 255.255.255.255 Huntgroup matching with this value for NAS-IP-Address will never work.

Help with LDAP authorization using groupOfNames and huntgroups

2004-03-26 Thread Casey Forbes
Hello, I'm having a lot of trouble getting my freeradius (CVS snap 20040323) to Allow/Deny access based on membership in LDAP groups (where the group names are associated with huntgroups). rlm_ldap docs and the mailing list archive didn't help me much.. I'd like to do something like this:

Re: Help with LDAP authorization using groupOfNames and huntgroups

2004-03-26 Thread Casey Forbes
Hm. That doesn't work either. rad_recv: Access-Request packet from host 127.0.0.1:40210, id=122, length=59 User-Name = cforbes User-Password = NAS-IP-Address = 255.255.255.255 NAS-Port = 0 Processing the authorize section of radiusd.conf modcall: entering group

Re: Help with LDAP authorization using groupOfNames and huntgroups

2004-03-26 Thread Casey Forbes
Yup - they are on the same line. Sorry about that misleading wrapping DEFAULT Huntgroup-Name == dialup, Ldap-Group == cn=Dialup,ou=Remote Access,dc=kensfoods,dc=com Fall-Through = yes DEFAULT Huntgroup-Name == wireless, Ldap-Group == cn=Wireless,ou=Remote Access,dc=kensfoods,dc=com