11-01-2022 07:04 PM - edited 11-01-2022 07:08 PM
Version: 5.2.2.0.317
I can successfully configure an LDAPS AAA for Services & Profiles, however I cannot get a successful authentication with Admins and Roles when using LDAPS or Active Directory. My goal is to let my administrators sign in with their ADDS credentials (Azure ADDS with Secure LDAP).
Admins and Roles -> AAA Configuration
Name Azure ADDS (LDAPS)
Type LDAP
Realms company.net.au,company.com.au,company
Default Role Mapping Yes
IP Address 20.213.x.x
Base Domain Name OU=AADDC Users,DC=company,DC=net,DC=au
Admin Domain Name CN=Company Bind Service Account,OU=AADDC Users,DC=company,DC=net,DC=au
Key Attribute sAMAccountName
Search Filter ((objectClass=*)(saMAccountName=ADM-*))
When testing a known-good username, it fails. I notice that the Admins and Roles section does not allow specifying LDAPS (636) or TLS as the protocol like the Services & Profiles section does. Is this a missing feature for my firmware version?
Any assistance would be appreciated. The same settings have been used in other applications and work perfectly fine, so my belief is that the Admins and Roles AAA section does not use TLS/Secure LDAP.
Thanks in advance!
05-30-2023 02:24 PM
Upload the CA certificate to Administration > System >Certificates > SZ Trusted CA Certificates/Chain (external). This allowed AD (TLS) to work for my internal domain. No other settings changes and I was getting that same error